Skip to main content

Physicists Unveil First Quantum Interconnect

One of the unsung workhorses of modern technology is the humble interconnect. This is essentially a wire or set of wires that link one part of an electronic system to another. In ordinary silicon chips, interconnect can take up most of the area of a chip; and the speed and efficiency with which information can travel along these interconnects, is a major limiting factor in computing performance.
So it’s no wonder that physicists and engineers are creating new generations of interconnect that will become the backbone of information processing machines of the future.
One of the most promising forms of number crunching is the quantum computer and its various associate quantum technologies, such as quantum communication, quantum cryptography, quantum metrology, and so on.
Physicists have made great strides in building proof-of-principle devices that exploit the laws of quantum physics to perform feats that would be impossible with purely classical mechanics. And yet a significant problem remains. These devices must work in isolation since nobody has perfected a way of joining them together effectively.
Today, that changes thanks to the work of Mark Thompson at the University of Bristol in the U.K. and a few pals around the world. These guys have built and tested a quantum interconnect that links separate silicon photonic chips and carries photons and, crucially, entanglement between them.
Quantum interconnect is a tricky proposition because of the fragile nature of entanglement, the bizarre way in which quantum particles share the same existence, even when they are far apart.
However, this state is extremely brittle — sneeze and it disappears. So quantum interconnect must preserve entanglement while transporting it from one place to another.
Thompson and co do this using a simple optical fiber and a clever quantum trick. Their silicon chips have two sources of photons that travel along photonic channels that overlap. When photons meet in the region of overlap, they become entangled and then carry this entanglement along separate paths through the device.
The role of the quantum interconnect is to transmit the photons to another chip where they retain their path-encoded entanglement. But how can this be done when the interconnect consists of a single path along a fiber?
The trick that Thomson and pals have perfected is to convert the path-entanglement into a different kind of entanglement, in this case involving polarization. They do this by allowing the path-entangled photons to interfere with newly created photons in a way that causes them to become polarized. This also entangles the newly created photons, which pass into the optical fiber and travel to the second silicon photonic chip.
The second chip reverses this process. There, the polarized-entangled photons are converted back into the path-entangled variety which then continue into the device as if they had come directly from the first chip.
The team has experimented with this proof-of-principle device and show that the entanglement is preserved throughout. “We demonstrate high-fidelity entanglement throughout the generation, manipulation, interconversion, distribution and measurement processes, across two integrated photonic circuits, successfully demonstrating the chip-to-chip quantum photonic interconnect,” they say.
It’s not perfect of course. Thompson and co admit they need to reduce the losses in the machine. But they say all this can be improved in future by optimizing various aspects of the design.
Overall, that’s an important step forward. Quantum interconnect is an enabling technology that should help to make possible a wide variety of new quantum devices that require different quantum subsystems to be linked together.
Ref: arxiv.org/abs/1508.03214 : Quantum Photonic Interconnect

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…