Russian Scientists Have Solved Light-Based Computers

Electromagnetic spectrum and visible light

High-performance microprocessors that harness photons rather than electrons promise to make computers up to a thousand times more efficient because electrons typically move at a low fraction of the speed of light.

Problem: scaling down conventional electronic microprocessors is easy; doing the same with photonic components is hard because of the difficulty of getting light to turn corners. So scientists have turned to plasmonic components, which take advantage of the unique oscillating interactions of photons and electrons on the surface of metal.

Unfortunately, plasmonic components get too hot and you can’t just throw a fan on them. You need a cooling system that works on the scale of the photonic chip’s key features, less than a billionth of a meter in size. It’s one reason why many don’t consider fully light-based transistors a practical possibility for decades. It’s also why there is such excitement around a new paper by a team of Russian researchers showing a new method for cooling photonic components.

Optoelectronics are already emerging as a key research area for companies like Oracle and IBM. IBM’s Zurich-based photonics research group explains why: “Based on the current trend toward ever more powerful high-end computers, it is expected that supercomputers comprising nearly 100 million computation modules and featuring exaflop performance rates, i.e. one trillion (1018) operations per second, will be developed within that timeframe. Without improved energy efficiency on all levels, however, a future supercomputer would require its own dedicated power plant.”

It’s no wonder the Defense Advanced Research Projects Agency, or DARPA, has also funded optoelectronic research.

What’s so hard about scaling down optoelectronic components? In order for your on-chip optoelectronic components to work with bulk light waves, it would have to be enormous, which destroys the efficiency gain you were going for. You can confine light to smaller dimensions by converting it into surface Plasmon polaritons, electromagnetic waves that propagate on the surface of a the chip’s metal and dielectric layers.

But these can cause overheating, a lot of overheating:  temperature increases of 100 Kelvin, a big enough temperature differential to take frozen water to boiling. The Russian researchers claim that their method, published this week in the journal ACS Photonics, can limit temperature increases to within just a few degrees K.

Such components “will give a possibility to create high-performance computers and analyze information many orders of magnitude faster than it is done today. However, in order to design computers based on these microprocessors (ranging from onboard computer for fighter aircrafts to exascale and zettascale supercomputers, which are required for data analysis and simulation of combat situations), the microprocessors should be efficiently cooled,” Dmitry Fedyanin, one of the authors of the paper, said in an email.

Business Insurance: http://bit.ly/20PwREg

« Cybersecurity Skill Shortage Has Industry Worried
Hard Lessons From The Cyberattack On Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Daisy Corporate Services

Daisy Corporate Services

Daisy is one of the largest providers of communications and IT solutions across the UK, with a portfolio spanning unified communications, cloud, cyber security and resilience.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.