mercoledì 22 luglio 2009

This Article Will Self-destruct: Tool To Make Online Personal Data Vanish


ScienceDaily (July 22, 2009) — Computers have made it virtually impossible to leave the past behind. College Facebook posts or pictures can resurface during a job interview. A lost cell phone can expose personal photos or text messages. A legal investigation can subpoena the entire contents of a home or work computer, uncovering incriminating, inconvenient or just embarrassing details from the past.
The University of Washington has developed a way to make such information expire. After a set time period, electronic communications such as e-mail, Facebook posts and chat messages would automatically self-destruct, becoming irretrievable from all Web sites, inboxes, outboxes, backup sites and home computers. Not even the sender could retrieve them.
"If you care about privacy, the Internet today is a very scary place," said UW computer scientist Tadayoshi Kohno. "If people understood the implications of where and how their e-mail is stored, they might be more careful or not use it as often."
The team of UW computer scientists developed a prototype system called Vanish that can place a time limit on text uploaded to any Web service through a Web browser. After a set time text written using Vanish will, in essence, self-destruct. A paper about the project went public today and will be presented at the Usenix Security Symposium Aug. 10-14 in Montreal.
Co-authors on the paper are doctoral student Roxana Geambasu, assistant professor Tadayoshi Kohno, professor Hank Levy and undergraduate student Amit Levy, all with the UW's department of computer science and engineering. The research was funded by the National Science Foundation, the Alfred P. Sloan Foundation and Intel Corp.
"When you send out a sensitive e-mail to a few friends you have no idea where that e-mail is going to end up," Geambasu said. "For instance, your friend could lose her laptop or cell phone, her data could be exposed by malware or a hacker, or a subpoena could require your e-mail service to reveal your messages. If you want to ensure that your message never gets out, how do you do that?"
Many people believe that pressing the "delete" button will make their data go away.
"The reality is that many Web services archive data indefinitely, well after you've pressed delete," Geambasu said.
Simply encrypting the data can be risky in the long term, the researchers say. The data can be exposed years later, for example, by legal actions that force an individual or company to reveal the encryption key. Current trends in the computing and legal landscapes are making the problem more widespread.
"In today's world, private information is scattered all over the Internet, and we can't control the lifetime of that data," said Hank Levy. "And as we transition to a future based on cloud computing, where enormous, anonymous datacenters run the vast majority of our applications and store nearly all of our data, we will lose even more control."
The Vanish prototype washes away data using the natural turnover, called "churn," on large file-sharing systems known as peer-to-peer networks. For each message that it sends, Vanish creates a secret key, which it never reveals to the user, and then encrypts the message with that key. It then divides the key into dozens of pieces and sprinkles those pieces on random computers that belong to worldwide file-sharing networks, the same ones often used to share music or movie files. The file-sharing system constantly changes as computers join or leave the network, meaning that over time parts of the key become permanently inaccessible. Once enough key parts are lost, the original message can no longer be deciphered.
In the current Vanish prototype, the network's computers purge their memories every eight hours. (An option on Vanish lets users keep their data for any multiple of eight hours.)
Unlike existing commercial encryption services, a message sent using Vanish is kept private by an inherent property of the decentralized file-sharing networks it uses.
"A major advantage of Vanish is that users don't need to trust us, or any service that we provide, to protect or delete the data," Geambasu says.
Researchers liken using Vanish to writing a message in the sand at low tide, where it can be read for only a few hours before the tide comes in and permanently washes it away. Erasing the data doesn't require any special action by the sender, the recipient or any third party service.
"Our goal was really to come up with a system where, through a property of nature, the message, or the data, disappears," Levy says.
Vanish was released today as a free, open-source tool that works with the Firefox browser. To work, both the sender and the recipient must have installed the tool. The sender then highlights any sensitive text entered into the browser and presses the "Vanish" button. The tool encrypts the information with a key unknown even to the sender.
That text can be read, for a limited time only, when the recipient highlights the text and presses the "Vanish" button to unscramble it. After eight hours the message will be impossible to unscramble and will remain gibberish forever.
Vanish works with any text entered into a Web browser: Web-based e-mail such as Hotmail, Yahoo and Gmail, Web chat, or the social networking sites MySpace and Facebook. The Vanish prototype now works only for text, but researchers said the same technique could work for any type of data, such as digital photos.
It is technically possible to save information sent with Vanish. A recipient could print e-mail and save it, or cut and paste unencrypted text into a word-processing document, or photograph an unscrambled message. Vanish is meant to protect communication between two trusted parties, researchers say.
"Today many people pick up the phone when they want to talk with a lawyer or have a private conversation," Kohno said. "But more and more communication is happening online. Vanish is designed to give people the same privacy for e-mail and the Web that they expect for a phone conversation."
The paper and research prototype are at http://vanish.cs.washington.edu.
Adapted from materials provided by University of Washington.

venerdì 17 luglio 2009

Program For Cyber Security 'Neighborhood Watch' Developed

SOURCE

ScienceDaily (July 16, 2009) — U.S. Department of Energy laboratories fight off millions of cyber attacks every year, but a near real-time dialog between these labs about this hostile activity has never existed – until now.
Scientists at DOE's Argonne National Laboratory have devised a program that allows for Cyber Security defense systems to communicate when attacked and transmit that information to cyber systems at other institutions in the hopes of strengthening the overall cyber security posture of the complex.
"The Federated Model for Cyber Security acts as a virtual neighborhood watch program. If one institution is attacked; secure and timely communication to others in the Federation will aide in protecting them from that same attack through active response," cyber security officer Michael Skwarek said.
Prior to the development of the Federated Model for Cyber Security, the exchange of hostile activity was solely on the shoulders of the human element. In cyber attacks, every second counts and the quicker that such information can be securely shared, will assist in strengthening others against similar attacks. With millions of cyber security probes a day, the human element will not be successful alone.
"This program addresses the need for the exchange of hostile activity information, with the goal of reducing the time to react across the complex. History has shown, hostile activity is often targeted at more than one location, and having our defenses ready and armed will assist greatly." Skwarek said.
Currently, the program is capable of transmitting information regarding hostile IP addresses and domain names, and will soon be able to share hostile email address and web URLs to others in the Federation.
The development of this program led to Skwarek along with Argonne's cyber security team members Matt Kwiatkowski, Tami Martin, Scott Pinkerton, Chris Poetzel, Gene Rackow and Conrad Zadlo winning the DOE's 2009 Cyber Security Innovation and Technology Achievement Award.
The Federated Model for Cyber Security has proved to be an important cyber security and communication tool. Use in the private sector, as well as in institutions with heavy collaborative efforts, can realize an operational gain by leveraging the power of sharing and learning from others on what they see and defend against on a daily basis.
Adapted from materials provided by DOE/Argonne National Laboratory.

martedì 14 luglio 2009

Tracking The Life And Death Of News


ScienceDaily (July 14, 2009) — As more and more news appears on the Internet as well as in print, it becomes possible to map the global flow of news by observing it online. Using this strategy, Cornell computer scientists have managed to track and analyze the "news cycle" -- the way stories rise and fall in popularity.
Jon Kleinberg, the Tisch University Professor of Computer Science at Cornell, postdoctoral researcher Jure Leskovec and graduate student Lars Backstrom tracked 1.6 million online news sites, including 20,000 mainstream media sites and a vast array of blogs, over the three-month period leading up to the 2008 presidential election -- a total of 90 million articles, one of the largest analyses anywhere of online news. They found a consistent rhythm as stories rose into prominence and then fell off over just a few days, with a "heartbeat" pattern of handoffs between blogs and mainstream media. In mainstream media, they found, a story rises to prominence slowly then dies quickly; in the blogosphere, stories rise in popularity very quickly but then stay around longer, as discussion goes back and forth. Eventually though, almost every story is pushed aside by something newer.
"The movement of news to the Internet makes it possible to quantify something that was otherwise very hard to measure -- the temporal dynamics of the news," said Kleinberg. "We want to understand the full news ecosystem, and online news is now an accurate enough reflection of the full ecosystem to make this possible. This is one [very early] step toward creating tools that would help people understand the news, where it's coming from and how it's arising from the confluence of many sources."
The researchers also say their work suggests an answer to a longstanding question: Is the "news cycle" just a way to describe our perception of what's going on in the media, or is it a real phenomenon that can be measured? They opt for the latter, and offer a mathematical explanation of how it works.
The research was presented at the Association for Computing Machinery Special Interest Group on Conference on Knowledge Discovery and Data Mining Conference June 28-July 1 in Paris.
The ideal, Kleinberg said, would be to track "memes," or ideas, through cyberspace, but deciding what an article is about is still a major challenge for computing. The researchers sidestepped that obstacle by tracking quotations that appear in news stories, since quotes remain fairly consistent even though the overall story may be presented in very different ways by different writers.
Even quotes may change slightly or "mutate" as they pass from one article to another, so the researchers developed an algorithm that could identify and group similar but slightly different phrases. In simple terms, the computer identified short phrases that were part of longer phrases, using those connections to create "phrase clusters." Then they tracked the volume of posts in each phrase cluster over time. In the August and September data they found threads rising and falling on a more or less weekly basis, with major peaks corresponding to the Democratic and Republican conventions, the "lipstick on a pig" discussion, rising concern over the financial crisis and discussions of a bailout plan.
The slow rise of a new story in the mainstream, the researchers suggest, results from imitation -- as more sites carried a story, other sites were more likely to pick it up. But the life of a story is limited, as new stories quickly push out the old. A mathematical model based on the interaction of imitation and recency predicted the pattern fairly well, the researchers said, while predictions based on either imitation or recency alone couldn't come close.
Watching how stories moved between mainstream media and blogs revealed a sharp dip and rise the researchers described as a "heartbeat." When a story first appears, there is a small rise in activity in both spheres; as mainstream activity increases, the proportion blogs contribute becomes small; but soon the blog activity shoots up, peaking an average of 2.5 hours after the mainstream peak. Almost all stories started in the mainstream. Only 3.5 percent of the stories tracked appeared first dominantly in the blogosphere and then moved to the mainstream.
The mathematical model needs to be refined, the researchers said, and they suggested further study of how stories move between sites with opposing political orientation. "It will be useful to further understand the roles different participants play in the process," the researchers concluded, "as their collective behavior leads directly to the ways in which all of us experience news and its consequences."
Adapted from materials provided by Cornell University.

venerdì 10 luglio 2009

Quantum Computers And Tossing A Coin In The Microcosm


ScienceDaily (July 9, 2009) — When you toss a coin, you either get heads or tails. By contrast, things are not so definite at the microcosmic level. An atomic 'coin' can display a superposition of heads and tails when it has been thrown. However, this only happens if you do not look at the coin. If you do, it decides in favour of one of the two states. If you leave the decision where a quantum particle should go to a coin like this, you get unusual effects. For the first time, physicists at the University of Bonn have demonstrated these effects in an experiment with caesium.
Let's assume we carried out the following experiment: we put a coin in the hand of a test person. We'll simply call this person Hans. Hans's task is now to toss the coin several times. Whenever the coin turns up 'heads', his task is to take a step to the right. By contrast, if it turns up 'tails', he takes a step to the left. After 10 throws we look where Hans is standing. Probably he won't have moved too far from his initial position, as 'heads' and 'tails' turn up more or less equally often. In order to walk 10 paces to the right, Hans would have to get 10 'heads' successively. And that tends not happen that often.
Now, we assume that Hans is a very patient person. He is so patient that he does this experiment 1000 times successively. After each go, we record his position. When at the end we display this result as a graph, we get a typical bell curve. Hans very often ends up somewhere close to his starting positions after 10 throws. By contrast, we seldom find him far to the left or right.
The experiment is called a 'random walk'. The phenomenon can be found in many areas of modern science, e.g. as Brownian motion. In the world of quantum physics, there is an analogy with intriguing new properties, the 'quantum walk'. Up to now, this was a more or less a theoretical construct, but physicists at the University of Bonn have now actually carried out this kind of 'quantum walk'.
A single caesium atom held in a kind of tweezers composed of laser beams served as a random walker and coin at the same time. Atoms can adopt different quantum mechanical states, similar to head and tails of a coin facing upwards. Yet at the microcosmic level everything is a little more complicated. This is because quantum particles can exist in a superposition of different states. Basically, in that case 'a bit of heads' and 'a bit of tails' are facing upwards. Physicists also call this superposition.
Using two conveyor belts made of laser beams, the Bonn physicists pulled their caesium atom in two opposite directions, the 'heads' part to the right, the 'tails' part to the left. 'This way we were able to move both states apart by fractions of a thousandth of a millimetre,' Dr. Artur Widera from the Bonn Institute of Applied Physics explains. After that, the scientists 'threw the dice once more' and put each of both components into a superposition of heads and tails again.
After several steps of this 'quantum walk' a caesium atom like this that has been stretched apart is basically everywhere. Only when you measure its position does it 'decide' at which position of the 'catwalk' it wants to turn up. The probability of its position is predominantly determined by a second effect of quantum mechanics. This is due to two parts of the atom being able to reinforce themselves or annihilate themselves. As in the case of light physicists call this interference.
As in the example of Hans the coin thrower, you can now carry out this 'quantum walk' many times. You then also get a curve which reflects the atom's probability of presence. And that is precisely what the physicists from Bonn measured. 'Our curve is clearly different from the results obtained in classical random walks. It does not have its maximum at the centre, but at the edges,' Artur Widera's colleague Michal Karski points out. 'This is exactly what we expect from theoretical considerations and what makes the quantum walk so attractive for applications.' For comparison the scientists destroyed the quantum mechanical superposition after every single 'throw of the coin'. Then the 'quantum walk' becomes a 'random walk', and the caesium atom behaves like Hans. 'And that is exactly the effect we see,' Michal Karski says.
Professor Dieter Meschede's group has been working on the development of so-called quantum computers now for many years. With the 'quantum walk' the team has now achieved a further seminal step on this path. 'With the effect we have demonstrated, entirely new algorithms can be implemented,' Artur Widera explains. Search processes are one example. Today, if you want to trace a single one in a row of zeros, you have to check all the digits individually. The time taken therefore increases linearly with the number of digits. By contrast, using the 'quantum walk' algorithm the random walker can search in many different places simultaneously. The search for the proverbial needle in a haystack would thus be greatly speeded up.
Their research will be published in the July 10 issue of the scientific journal Science.
Adapted from materials provided by University of Bonn.

martedì 7 luglio 2009

DIY Production In 'Second Life' Factory


ScienceDaily (July 7, 2009) — Anyone who wants to can now produce their own vehicle in a factory on the “Second Life” Internet platform. They can program the industrial robots, and transport and assemble the individual parts themselves. Learning platforms provide relevant background information.
In the “transparent factory”, car enthusiasts can watch vehicles being assembled part by part, and a new system set up by researchers of the Fraunhofer Institute for Manufacturing Engineering and Automation IPA even enables users to try their own hand at producing a quad bike, a four-wheeled motorbike. They can switch on conveyor belts, program industrial robots, and paint the frame themselves. At the end, they can zoom out of the factory hall with their finished product without paying a single cent. How is this possible? Because the factory does not exist in the real world but on the Internet platform of “Second Life”, a virtual world through which users can move in the form of a virtual figure known as an “avatar”.
“With the ‘factory of eMotions’, we want to familiarize people with a modern, technically advanced factory. We also want to demonstrate how the latest media can set things in motion,” says IPA scientist
Stefan Seitz. “Second Life has grown steadily: While in 2007, between 20,000 and 40,000 people were simultaneously online at any given time, this number has now risen to between 50,000 and 80,000.” In the factory, users first of all indicate which quad model they would like to produce. Powerful or fuel-saving? Black, silver or red? What type of wheel rims? They can choose from a variety of models as they please. Once their avatar has made a choice, production can begin. The parts list is sent out, and all components are manufactured, assembled and subjected to a quality inspection. The avatar can watch the production process and interact at certain stages. Learning platforms located at various points in the factory hall provide users with relevant background information. How is the production process controlled? How does a press work?
“The main challenge lay in reproducing the control logic for production – in other words, teaching the system how to produce a part on Machine A, transport it to Machine B and mount it there. Until now, the ‘Second Life’ platform has offered no support for this,” says Seitz. The researchers have developed a modular system which also enables any other product to be made. Industrial companies and private users can use the building blocks to set up their own virtual factories. The scientists have even integrated a speech recognition system, so the machines and robots can also be controlled by telephone. The factory will be revealed to the public in early July on the occasion of the IPA’s 50th anniversary.
Adapted from materials provided by Fraunhofer-Gesellschaft.

Physicists Find Way To Control Individual Bits In Quantum Computers.

SOURCE

ScienceDaily (July 7, 2009) — Physicists at the National Institute of Standards and Technology (NIST) have overcome a hurdle in quantum computer development, having devised a viable way to manipulate a single "bit" in a quantum processor without disturbing the information stored in its neighbors. The approach, which makes novel use of polarized light to create "effective" magnetic fields, could bring the long-sought computers a step closer to reality.
A great challenge in creating a working quantum computer is maintaining control over the carriers of information, the "switches" in a quantum processor while isolating them from the environment. These quantum bits, or "qubits," have the uncanny ability to exist in both "on" and "off" positions simultaneously, giving quantum computers the power to solve problems conventional computers find intractable – such as breaking complex cryptographic codes.
One approach to quantum computer development aims to use a single isolated rubidium atom as a qubit. Each such rubidium atom can take on any of eight different energy states, so the design goal is to choose two of these energy states to represent the on and off positions. Ideally, these two states should be completely insensitive to stray magnetic fields that can destroy the qubit's ability to be simultaneously on and off, ruining calculations. However, choosing such "field-insensitive" states also makes the qubits less sensitive to those magnetic fields used intentionally to select and manipulate them. "It's a bit of a catch-22," says NIST's Nathan Lundblad. "The more sensitive to individual control you make the qubits, the more difficult it becomes to make them work properly."
To solve the problem of using magnetic fields to control the individual atoms while keeping stray fields at bay, the NIST team used two pairs of energy states within the same atom. Each pair is best suited to a different task: One pair is used as a "memory" qubit for storing information, while the second "working" pair comprises a qubit to be used for computation. While each pair of states is field- insensitive, transitions between the memory and working states are sensitive, and amenable to field control. When a memory qubit needs to perform a computation, a magnetic field can make it change hats. And it can do this without disturbing nearby memory qubits.
The NIST team demonstrated this approach in an array of atoms grouped into pairs, using the technique to address one member of each pair individually. Grouping the atoms into pairs, Lundblad says, allows the team to simplify the problem from selecting one qubit out of many to selecting one out of two – which, as they show in their paper, can be done by creating an effective magnetic field, not with electric current as is ordinarily done, but with a beam of polarized light.
The polarized-light technique, which the NIST team developed, can be extended to select specific qubits out of a large group, making it useful for addressing individual qubits in a quantum processor without affecting those nearby. "If a working quantum computer is ever to be built," Lundblad says, "these problems need to be addressed, and we think we've made a good case for how to do it." But, he adds, the long-term challenge to quantum computing remains: integrating all of the required ingredients into a single apparatus with many qubits.
Journal reference:
N. Lundblad, J.M. Obrecht, I.B. Spielman, and J.V. Porto. Field-sensitive addressing and control of field-insensitive neutral-atom qubits. Nature Physics, July 5, 2009
Adapted from materials provided by National Institute of Standards and Technology (NIST).

venerdì 3 luglio 2009

Computer Scientists Develop Model For Studying Arrangements Of Tissue Networks By Cell Division


ScienceDaily (July 3, 2009) — Computer scientists at Harvard have developed a framework for studying the arrangement of tissue networks created by cell division across a diverse set of organisms, including fruit flies, tadpoles, and plants.
The finding, published in the June 2009 issue of PLoS Computational Biology, could lead to insights about how multicellular systems achieve (or fail to achieve) robustness from the seemingly random behavior of groups of cells and provide a roadmap for researchers seeking to artificially emulate complex biological behavior.
"We developed a model that allows us to study the topologies of tissues, or how cells connect to each other, and understand how that connectivity network is created through generations of cell division," says senior author Radhika Nagpal, Assistant Professor of Computer Science at the Harvard School of Engineering and Applied Sciences (SEAS) and a core faculty member of the Wyss Institute for Biologically Inspired Engineering. "Given a cell division strategy, even if cells divide at random, very predictable 'signature' features emerge at the tissue level."
Using their computational model, Nagpal and her collaborators demonstrated that the regularity of the tissue, such as the percentage of hexagons and the overall cell shape distribution, can act as an indicator for inferring properties about the cell division mechanism itself. In the epithelial tissues of growing organisms, from fruit flies to humans, the ability to cope with often unpredictable variations (referred to as robustness) is critical for normal development. Rapid growth, entailing large amounts of cell division, must be balanced with the proper regulation of overall tissue and organ architecture.
"Even with modern imaging methods, we can rarely directly 'ask' the cell how it decided upon which way to divide. The computational tool allows us to generate and eliminate hypotheses about cell division. Looking at the final assembled tissue gives us a clue about what assembly process was used," explains Nagpal.
The model also sheds light on a prior discovery made by the team: that many proliferating epithelia, from plants to frogs, show a nearly identical cell shape distribution. While the reasons are not clear, the authors suggest that the high regularity observed in nature requires a strong correlation between how neighboring cells divide. While plants and fruit flies, for example, seem to have conserved cell shape distributions, the two organisms have, based on the computational and experimental evidence, evolved distinct ways of achieving such a pattern.
"Ultimately, the work offers a beautiful example of the way biological development can take advantage of very local and often random processes to create large-scale robust systems. Cells react to local context but still create organisms with incredible global predictability," says Nagpal.
In the future, the team plans to use their approach to detect and study various mutations that adversely affect cell division process in epithelial tissues. Epithelial tissues are common throughout animals and form important structures in humans from skin to the inner lining of organs. Deviations from normal division can result in abnormal growth during early development and to the formation of cancers in adults.
"One day we may even be able to use our model to help researchers understand other kinds of natural cellular networks, from tissues to geological crack formations, and, by taking inspiration from biology, design more robust computer networks," adds Nagpal.
Nagpal's collaborators included Ankit B. Patel and William T. Gibson, both at Harvard, and Dr. Matthew C. Gibson at Stower's Institute.
Adapted from materials provided by Harvard University, via EurekAlert!, a service of AAAS.

giovedì 2 luglio 2009

Optical Computer Closer: Optical Transistor Made From Single Molecule

SOURCE

ScienceDaily (July 2, 2009) — ETH Zurich researchers have successfully created an optical transistor from a single molecule. This has brought them one step closer to an optical computer.
Internet connections and computers need to be ever faster and more powerful nowadays. However, conventional central processing units (CPUs) limit the performance of computers, for example because they produce an enormous amount of heat. The millions of transistors that switch and amplify the electronic signals in the CPUs are responsible for this. One square centimeter of CPU can emit up to 125 watts of heat, which is more than ten times as much as a square centimeter of an electric hotplate.
Photons instead of electrons
This is why scientists have been trying for some time to find ways to produce integrated circuits that operate on the basis of photons instead of electrons. The reason is that photons do not only generate much less heat than electrons, but they also enable considerably higher data transfer rates.
Although a large part of telecommunications engineering nowadays is based on optical signal transmission, the necessary encoding of the information is generated using electronically controlled switches. A compact optical transistor is still a long way off. Vahid Sandoghdar, Professor at the Laboratory of Physical Chemistry of ETH Zurich, explains that, “Comparing the current state of this technology with that of electronics, we are somewhat closer to the vacuum tube amplifiers that were around in the fifties than we are to today’s integrated circuits.”
However, his research group has now achieved a decisive breakthrough by successfully creating an optical transistor with a single molecule. For this, they have made use of the fact that a molecule’s energy is quantized: when laser light strikes a molecule that is in its ground state, the light is absorbed. As a result, the laser beam is quenched. Conversely, it is possible to release the absorbed energy again in a targeted way with a second light beam. This occurs because the beam changes the molecule’s quantum state, with the result that the light beam is amplified. This so-called stimulated emission, which Albert Einstein described over 90 years ago, also forms the basis for the principle of the laser.
Focusing on a nano scale
Jaesuk Hwang, first author of the study and a scientific member of Sandoghdar’s nano-optics group, explains that, “Amplification in a conventional laser is achieved by an enormous number of molecules.” By focusing a laser beam on only a single tiny molecule, the ETH Zurich scientists have now been able to generate stimulated emission using just one molecule. They were helped in this by the fact that, at low temperatures, molecules seem to increase their apparent surface area for interaction with light . The researchers therefore needed to cool the molecule down to minus 272 degrees Celsius (minus 457.6 degrees Fahrenheit), i.e. one degree above absolute zero. In this case, the enlarged surface area corresponded approximately to the diameter of the focused laser beam.
Switching light with light
By using one laser beam to prepare the quantum state of a single molecule in a controlled fashion, scientists could significantly attenuate or amplify a second laser beam. This mode of operation is identical to that of a conventional transistor, in which electrical potential can be used to modulate a second signal.
Thus component parts such as the new single molecule transistor may also pave the way for a quantum computer. Sandoghdar says, “Many more years of research will still be needed before photons replace electrons in transistors. In the meantime, scientists will learn to manipulate and control quantum systems in a targeted way, moving them closer to the dream of a quantum computer.”
Journal reference:
J. Hwang, M. Pototschnig, R. Lettow, G. Zumofen, A. Renn, S. Götzinger, V. Sandoghda. A single-molecule opzical transistor. Nature, 460, 76-80 DOI: 10.1038/nature08134
Adapted from materials provided by ETH Zurich.

mercoledì 1 luglio 2009

Quantum Communications One Step Closer: Novel Ion Trap For Sensing Force And Light Developed

SOURCE

ScienceDaily (July 1, 2009) — Miniature devices for trapping ions (electrically charged atoms) are common components in atomic clocks and quantum computing research. Now, a novel ion trap geometry demonstrated at the National Institute of Standards and Technology (NIST) could usher in a new generation of applications because the device holds promise as a stylus for sensing very small forces or as an interface for efficient transfer of individual light particles for quantum communications.
The "stylus trap," built by physicists from NIST and Germany's University of Erlangen-Nuremberg, is described in Nature Physics. It uses fairly standard techniques to cool ions with laser light and trap them with electromagnetic fields. But whereas in conventional ion traps, the ions are surrounded by the trapping electrodes, in the stylus trap a single ion is captured above the tip of a set of steel electrodes, forming a point-like probe. The open trap geometry allows unprecedented access to the trapped ion, and the electrodes can be maneuvered close to surfaces. The researchers theoretically modeled and then built several different versions of the trap and characterized them using single magnesium ions.
The new trap, if used to measure forces with the ion as a stylus probe tip, is about one million times more sensitive than an atomic force microscope using a cantilever as a sensor because the ion is lighter in mass and reacts more strongly to small forces. In addition, ions offer combined sensitivity to both electric and magnetic fields or other force fields, producing a more versatile sensor than, for example, neutral atoms or quantum dots. By either scanning the ion trap near a surface or moving a sample near the trap, a user could map out the near-surface electric and magnetic fields. The ion is extremely sensitive to electric fields oscillating at between approximately 100 kilohertz and 10 megahertz.
The new trap also might be placed in the focus of a parabolic (cone-shaped) mirror so that light beams could be focused directly on the ion. Under the right conditions, single photons, particles of light, could be transferred between an optical fiber and the single ion with close to 95 percent efficiency. Efficient atom-fiber interfaces are crucial in long-distance quantum key cryptography (QKD), the best method known for protecting the privacy of a communications channel. In quantum computing research, fluorescent light emitted by ions could be collected with similar efficiency as a read-out signal. The new trap also could be used to compare heating rates of different electrode surfaces, a rapid approach to investigating a long-standing problem in the design of ion-trap quantum computers.
Research on the stylus trap was supported by the Intelligence Advanced Research Projects Activity.
Journal reference:
R. Maiwald, D. Leibfried, J. Britton, J.C. Bergquist, G. Leuchs, and D.J. Wineland. Stylus ion trap for enhanced access and sensing. Nature Physics, Online June 28
Adapted from materials provided by National Institute of Standards and Technology.