In July 2020, 300 researchers from 34 different countries attended the CECAM virtual workshop, ‘Quantum Battles in Attoscience’. EPJ D presents three community papers which emerged from the in-depth panel discussions held at this occasion. […]
In July 2020, 300 researchers from 34 different countries attended the CECAM virtual workshop, ‘Quantum Battles in Attoscience’. EPJ D presents three community papers which emerged from the in-depth panel discussions held at this occasion. […]
Ever since I posted my obituary for the great Steven Weinberg three months ago, I’ve gotten a steady trickle of emails—all of which I’ve appreciated enormously—from people who knew Steve, or were influenced by him, […]
Topology in optics and photonics has been a hot topic since 1890 where singularities in electromagnetic fields have been considered. The recent award of the Nobel prize for topology developments in condensed matter physics has […]
RESEARCH NEWS RELEASE — Convolutional neural networks running on quantum computers have generated significant buzz for their potential to analyze quantum data better than classical computers can. While a fundamental solvability problem known as “barren […]
In the past few years, suitably engineered stacks of two-dimensional materials have emerged as a powerful platform for studying quantum correlations between electronic states. Physicists now demonstrate how key properties of such systems can be […]
Organizations tend to do two things when faced with oncoming waves of disruptive technologies: fight it or adapt to it. Not JSR Corporation, a Japanese-based global leader in materials and life sciences innovation. They embrace […]
If you’ve visited Shtetl-Optimized lately — which, uh, I suppose you have — you may have noticed that your URL was redirected from www.scottaaronson.com/blog to scottaaronson.blog. That’s because Automattic, which owns WordPress, volunteered to move […]
Toppan and blueqat are reporting in a research paper that they have created a new photonic quantum computation method that significantly reduced computation time. In a news release, the companies indicate that their method reduces computation […]
Consumers need to be confident that transactions they make online are safe and secure. A main method to protect customer transactions and other information is through encryption, where vital information is encoded with a key […]
By implementing a new signal stabilization technique, researchers were able to achieve secure quantum communication over a record 605 kilometers of fiber using the twin-field quantum key distribution (QKD) protocol. The new demonstration paves the […]
Recent Comments