Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission + - The Quantum Experiment That Simulates A Time Machine

KentuckyFC writes: One of the extraordinary features of quantum mechanics is that one quantum system can simulate the behaviour of another that might otherwise be difficult to create. That's exactly what a group of physicists in Australia have done in creating a quantum system that simulates a quantum time machine. Back in the early 90s, physicists showed that a quantum particle could enter a region of spacetime that loops back on itself, known as a closed timelike curve, without creating grandfather-type paradoxes in which time travellers kill their grandfathers thereby ensuring they could never have existed to travel back in time in the first place. Nobody has ever built a quantum closed time-like curve but now they don't have to. The Australian team have simulated its behaviour by allowing two entangled photons to interfere with each other in a way that recreates the behaviour of a single photon interacting with an older version of itself. The results are in perfect agreement with predictions from the 1990s--there are no grandfather-type paradoxes. Interestingly, the results are entirely compatible with relativity, suggesting that this type of experiment might be an interesting way of reconciling it with quantum mechanics.

Submission + - Telomere-Lengthening Procedure Turns Clock Back Years in Human Cells (gizmag.com) 2

Zothecula writes: Researchers at the Stanford University School of Medicine have developed a new procedure to increase the length of human telomeres. This increases the number of times cells are able to divide, essentially making the cells many years younger. This not only has useful applications for laboratory work, but may point the way to treating various age-related disorders – or even muscular dystrophy.

Submission + - Georgia Institute of Technology Researchers Bridge the Airgap (hacked.com) 1

An anonymous reader writes: Hacked has a piece about Georgia Institute of Technology Researchers keylogging from a distance using the electromagnetic radiation of CPUs. They can reportedly do this from up to 6 meters away. In this video, using two Ubuntu laptops, they demonstrate that keystrokes are easily interpreted with the software they have developed. In their whitepaper they talk about the need for more research in this area so that hardware and software manufacturers will be able to develop more secure devices. For now, Farraday cages don't seem as crazy as they used to, or do they?
GNU is Not Unix

Can Employer Usurp Copyright On GPL-Derived Work? 504

An anonymous reader writes "I am a recent graduate, and I've been working on my own on a project that uses GPL-licensed libraries. Later a university department hired me, on a part-time basis, to develop this project into a solution that they needed. The project's size increased over time and soliciting help from the open source community seemed like the obvious thing to do. However, when I suggested this, my boss was not interested, and it was made clear to me that the department's position was that copyright of the whole thing belonged to them. Indeed, by default work created for an employer belongs to the employer, so I may have gotten myself in the same trap discussed here years ago. Even though I want to release my code to the public I don't know whether I have the legal right to do so. I did start the project on my own. And, since no written or verbal agreement was ever made to transfer copyright over to my employer, I question whether they can claim that they now own the extended version of the project. Also, the whole project relies on GPL libraries, and without those libraries it would be useless. Can they still claim copyright and prevent me from publishing the source code even though it is derived from GPL software?" Some early commenters on the submission pointed out that it matters whether the libraries were licensed under the LGPL vs. the GPL.
Input Devices

Demo of Laptop/Tabletop Hybrid UI Screenshot-sm 66

TheGrapeApe writes "The ACM Symposium on User Interface Software and Technology (ACMUIST) has an interesting proof-of-concept video up demonstrating the use of cameras and laser pico-projectors to 'extend' a laptop's user interface to adjacent surfaces. The video demonstrates some simple gestures like tapping and dragging being captured on the 'extended' surface. While the prototype appears to be somewhat cumbersome, it's easy to see how it might be more elegantly integrated into the hardware with more R&D."
Biotech

MIT Researchers Harness Viruses To Split Water 347

ByronScott writes "A team of researchers at MIT has just announced that they have successfully modified a virus to split apart molecules of water, paving the way for an efficient and non-energy-intensive method of producing hydrogen fuel. 'The team, led by Angela Belcher, the Germeshausen Professor of Materials Science and Engineering and Biological Engineering, engineered a common, harmless bacterial virus called M13 so that it would attract and bind with molecules of a catalyst (the team used iridium oxide) and a biological pigment (zinc porphyrins). The viruses became wire-like devices that could very efficiently split the oxygen from water molecules. Over time, however, the virus-wires would clump together and lose their effectiveness, so the researchers added an extra step: encapsulating them in a microgel matrix, so they maintained their uniform arrangement and kept their stability and efficiency.'"
Robotics

5-Axis Robot Carves Metal Like Butter 277

kkleiner sends along an amazing video of what robot-controlled machining is coming to. "Industrial robots are getting precise enough that they're less like dumb machines and more like automated sculptors producing artwork. Case in point: Daishin's Seki 5-axis mill. The Japanese company celebrated its 50th anniversary last year by using this machine to carve ... a full-scale motorcycle helmet out of one piece of aluminum. No breaks, no joints, the 5-Axis mill simply pivots and rotates to carve metal at some absurd angles. Every cut is guided by sophisticated 3-D design software (Openmind’s HyperMill)."
Medicine

PARC Builds iPod-Sized HIV Detector 93

MikeChino writes "Right now it's difficult, if not impossible, to quickly detect HIV in patients living in impoverished countries. That may all change soon, though — researchers at a California outfit called the Palo Alto Research Center have built an iPod-sized handheld device that can provide an immune check-up in under 10 minutes — all with a prick of the finger. With millions of people around the world without access to a full-size laboratory, PARC's device could revolutionize the detection and treatment of HIV."
Linux Business

SoftMaker Office 2010 For Linux Nearing Release 110

martin-k writes "SoftMaker Office is a Microsoft-compatible office suite that competes with OpenOffice.org. Its creator, German software publisher SoftMaker, is nearing completion of the latest release, SoftMaker Office 2010 for Linux. This new release offers document tabs, high-quality filters for the Microsoft Office 2007 file formats DOCX and XLSX, and presentation-quality charts in the spreadsheet. It also brings integration into KDE and Gnome, using the system's colors and fonts. A release candidate is available as a free download."
Encryption

Theoretical Breakthrough For Quantum Cryptography 116

KentuckyFC writes "Quantum cryptography uses the quantum properties of photons to guarantee perfect secrecy. But one of its lesser known limitations is that it only works if Alice and Bob are perfectly aligned so that they can carry out well-defined polarization measurements on the photons as they arrive. Physicists say that Alice and Bob must share the same reference frame. That's OK if Alice and Bob are in their own ground-based labs, but it's a problem in many other applications, such as ground-to-satellite communications or even in chip-to-chip communications, because it's hard to keep chips still over distances of the order of the wavelength of light. Now a group of UK physicists have developed a way of doing quantum cryptography without sharing a reference frame. The trick is to use entangled triplets of photons, so-called qutrits, rather than entangled pairs. This solves the problem by embedding it in an extra abstract dimension, which is independent of space. So, as long as both Alice and Bob know the way in which all these abstract dimensions are related, the third provides a reference against which measurements of the other two can be made. That allows Alice and Bob to make any measurements they need without having to agree ahead of time on a frame of reference. That could be an important advance enabling the widespread use of quantum cryptography."
Programming

Whatever Happened To Programming? 623

Mirk writes "In a recent interview, Don Knuth wrote: 'The way a lot of programming goes today isn't any fun because it's just plugging in magic incantations — combine somebody else's software and start it up.' The Reinvigorated Programmer laments how much of our 'programming' time is spent pasting not-quite-compatible libraries together and patching around the edges." This 3-day-old article has sparked lively discussions at Reddit and at Hacker News, and the author has responded with a followup and summation.

Slashdot Top Deals

Were there fewer fools, knaves would starve. - Anonymous

Working...