Related topics: google · iphone · facebook · hacker · twitter

Ultrafast quantum simulation of large-scale quantum entanglement

A research group led by Professor Kenji Ohmori at the Institute for Molecular Science, National Institutes of Natural Sciences are using an artificial crystal of 30,000 atoms aligned in a cubic array with a spacing of 0.5 ...

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Doomsday Clock to be updated on January 24

Tick, tick, tick. An update is coming to the "Doomsday Clock," representing the judgment of leading science and security experts about the perils to human existence.

The hidden footprint of low-carbon indoor farming

A new study challenges the universal land-saving claims of vertical farming, finding that there is no one size fits all approach for land use, food security and sustainable agriculture.

page 4 from 40