Modern physics experiments are often complex, ambitious, and costly. The times where scientific progress could be made by conducting a small tabletop experiment in your lab are mostly over. Especially, in fields like astrophysics or particle physics, you need huge telescopes, expensive satellite missions, or giant colliders run by international collaborations with hundreds or thousands of participants. To drive this point home: the largest machine ever built by humankind is the Large Hadron Collider (LHC). You won’t be surprised to hear that even just managing the data it produces is a super-sized task.
Since its start in 2008, the LHC at CERN has received several upgrades to stay at the cutting edge of technology. Currently, the machine is in its second long shutdown and being prepared to restart in May 2021. One of the improvements of Run 3 will be to deliver particle collisions at a higher rate, quantified by the so-called luminosity. This enables experiments to gather more statistics and to better study rare processes. At the end of 2024, the LHC will be upgraded to the High-Luminosity LHC which will deliver an increased luminosity by up to a factor of 10 beyond the LHC’s original design value.
Currently, the major experiments ALICE, ATLAS, CMS, and LHCb are preparing themselves to cope with the expected data rates in the range of Terabytes per second. It is a perfect time to look into more detail at the data acquisition, storage, and analysis of modern high-energy physics experiments. Continue reading “Crunching Giant Data From The Large Hadron Collider”
It has been a while since we thought about computers and thought about Honeywell. Sure, they had a series of computers they bought from General Electric and Computer Control Company in the 1970s. Even before that they joined with Raytheon and produced vacuum tube computers that later morphed into transistor-based computers. But in recent years, you are more likely to think of Honeywell for thermostats, air filters, and industrial controls. But now, Honeywell has come out of the computer shadows with some impressive quantum computer hardware and they clearly have big plans.
Comparing quantum computers is a bit dicey just as, for example, judging CPUs by instructions per second has its problems. In the past, vendors have jockeyed for the maximum number of qubits, but that’s misleading in some cases. Processing power depends on the number of qubits, their quality, and how they are connected. IBM introduced the idea of quantum volume and Honeywell claims their new machine will hit 64 by that measure, twice that of anyone else’s quantum computer that we know about.
Continue reading “Honeywell May Pull Into The Quantum Computer Lead”
In any normal situation, if you’d read an article that about building your own quantum computer, a fully understandable and natural reaction would be to call it clickbaity poppycock. But an event like the Chaos Communication Congress is anything but a normal situation, and you never know who will show up and what background they will come from. A case in point: security veteran [Yann Allain] who is in fact building his own quantum computer in his garage.
Starting with an introduction to quantum computing itself, and what makes it so powerful also in the context of security, [Yann] continues to tell about his journey of building a quantum computer on his own. His goal was to build a stable computer he could “easily” create by himself in his garage, which will work at room temperature, using trapped ion technology. After a few iterations, he eventually created a prototype with KiCad that he cut into an empty ceramic chip carrier with a hobbyist CNC router, which will survive when placed in a vacuum chamber. While he is still working on a DIY laser system, he feels confident to be on the right track, and his estimate is that his prototype will achieve 10-15 qubits with a single ion trap, aiming to chain several ion traps later on.
As quantum computing is often depicted as cryptography’s doomsday device, it’s of course of concern that someone might just build one in their garage, but in order to improve future cryptographic systems, it also requires to fully understand — also on a practical level — quantum computing itself. Whether you want to replicate one yourself, at a rough cost of “below 15k Euro so far” is of course a different story, but who knows, maybe [Yann] might become the Josef Prusa of quantum computers one day.
Continue reading “36C3: Build Your Own Quantum Computer At Home”
Ever wondered what “cyberwar” looks like? Apparently it’s a lot of guessing security questions and changing passwords. It’s an interesting read on its own, but there are some interesting clues if you read between the lines. A General in the know mentioned that Isis:
clicked on something or they did something that then allowed us to gain control and then start to move.
This sounds very similar to stories we’ve covered in the past, where 0-days are used to compromise groups or individuals. Perhaps the NSA supplied such an exploit, and it was sent in a phishing attack. Through various means, the U.S. team quietly compromised systems and collected credentials.
The article mentions something else interesting. Apparently the targets of this digital sting had also been compromising machines around the world, and using those machines to manage their efforts. The decision was made by the U.S. team to also compromise those machines, in order to lock out the Isis team. This might be the most controversial element of the story. Security researchers have wanted permission to do this for years. How should the third parties view these incursions?
The third element that I found particularly interesting was the phase 2 attack. Rather than outright delete, ban, and break Isis devices and accounts, the U.S. team installed persistent malware that emulated innocuous glitches. The internet connection is extremely laggy on certain days, certain websites simply don’t connect, and other problems. These are the sort of gremlins that networking pros spend all day trying to troubleshoot. The idea that it’s intentional gives me one more thing to worry about. Continue reading “This Week In Security: Is RSA Finally Broken? The Push For Cloud Accounts, Encrypted DNS, And More Mobile Mayhem”
If quantum physics always sounded a little squirrelly to you, take heart. Yale researchers have announced that they can do what quantum physics claimed to be impossible: they can determine the state a quantum system will collapse to before it happens. This contradicts Schrodinger’s famous hypothetical cat that is superimposed as 50% alive and 50% dead at the same time. The research appears in Nature.
Schrodinger argued that until you open the box, the cat is half alive and half dead in the same way that a qubit can be in 50% of one state or another. When you observe it, you force the system to one state. Researchers at Yale, however, have found a way to use microwaves to indirectly monitor qubits to determine their state prior to the system making a jump. Unlike a normal observation which occurs too late, the Yale technique allows researchers to change the future state to their choice.
Continue reading “Schrodinger’s Cat Lives”
We all know that quantum computing is coming, but it is hard to know how to get started with it. [Mtreinish] suggests Qiskit — an Apache Licensed SDK for developing quantum applications. He has a presentation he gave in Singapore that you can see below, and a notebook you can go through on GitHub. If you are impatient, you can even run the notebook online through Google.
The tools can work against several backends including a simulator or the real hardware available from IBM. The official site has a different notebook you can use as a tutorial. Interestingly, the foundation of all Qiskit programs is “Terra” (the Earth) and permeating all Qiskit elements is Aer or air. There are also fire and water elements. At the bottom of the official notebook, you’ll find a lot of community notebooks that go deeper into specific topics.
Continue reading “Quantum Computing With QISKit”
They may be out of style now, and something of a choking hazard for toddlers, but there’s no denying that spring doorstops make a great sound when they’re “plucked” by a foot as you walk by. Sure, maybe not on a 2:00 AM bathroom break when the rest of the house is sleeping, but certainly when used as sensors in this interactive light show.
The idea behind [Robin Baumgarten]’s “Quantum Garden” is clear from the first video below: engaging people through touch, sound, and light. Each of the 228 springs, surrounded by a Neopixel ring, is connected to one of the 12 inputs on an MPR121 capacitive touch sensor. The touch sensors and an accelerometer in the base detect which spring is sproinging and send that information to a pair of Teensies. A PC then runs the simulations that determine how the lights will react. The display is actually capable of some pretty complex responses, including full-on games. But the most interesting modes demonstrate principles of quantum computing, specifically stimulated Raman adiabatic passage (STIRAP), which describes transfers between quantum states. While the kids in the first video were a great stress test, the second video shows the display under less stimulation and gives a better idea of how it works.
We like this because it uses a simple mechanism of springs to demonstrate difficult quantum concepts in an engaging way. If you need more background on quantum computing, [Al Williams] has been covering the field for a while. Need the basics? Check out [Will Sweatman]’s primer.
Continue reading “Door Springs And Neopixels Demonstrate Quantum Computing Principles”