Sep 20, 2015 12:00
menstruation,
history,
hitler,
music,
technology,
science,
rape,
language,
data,
advertising,
women,
porn,
hiv,
murder,
drwho,
economics,
space,
shakespeare,
viaelfy,
genocide,
innovation,
viabartcalendar,
privacy,
children,
links
Leave a comment
http://quantumfrontiers.com/2013/10/23/the-10-biggest-breakthroughs-in-physics-over-the-past-25-years-according-to-us/
I think the question here is which of these will actually lead to fundamental changes. Two of them relate to quantum computing which could be practical relatively soon. I don't actually know about topological insulators, sounds potentially useful. Then there are some revisions to standard model of physics -- when I did my physics degree the neutrino mass question was still very much open (indeed I did a long essay on the subject) now it's fixed and with the unexpected answer. These could lead to new breakthroughs over the next 25 years.
Oh, I missed photonic computing off my list of potential revolutions. Some of the guys are UCL (and elsewhere in the world of course) are directly pumping data between the memory of different machines using modulated light beams with nothing going up and down the networking stack (would bloody put all my TCP/IP knowledge out of the window). That's pretty radical.
Reply
And yes, lots of fundamental stuff going on. Which raises the question of what date you count things from (as you mentioned above). And I think the original article definitely cheats there in where it allocates items to.
Reply
Obviously you can put firewalls in between to filter out undesirable stuff -- but then just switch the photonic model to be DMA to the firewall that filters and does DMA to your machine if it is OK with what is sent.
Obviously, its undesirable to simply trust whatever lands in your TCP buffer -- but there's already a number of ways that computers deal with the problem of untrusted and potentially malicious information incoming to your machine.
Reply
In which case, how does the photonic method make TCP/IP irrelevant? Do we not need to route light to the correct computer?
Reply
There is optical switching but it's weird and unrelated (still using standard networking stacks with layers on top).
Reply
I think that's where I got confused - if we were doing without a network stack at all, I assumed we'd be piping stuff directly into memory locations in the other PC, which is clearly very dangerous. If you find out more, and can explain it in words I'd understand, I'd be interested.
Reply
Reply
I wonder how to do something like that when the other endpoint is not trusted...
Reply
Leave a comment