Time goes in one direction: forward. Little boys become old men but not vice versa; teacups shatter but never spontaneously reassemble. This cruel and immutable property of the universe, called the “arrow of time,” is fundamentally a consequence of the second law of thermodynamics, which dictates that systems will always tend to become more disordered over time. But recently, researchers from the U.S. and Russia have bent that arrow just a bit — at least for subatomic particles.
In the new study, published Tuesday (Mar. 12) in the journal Scientific Reports, researchers manipulated the arrow of time using a very tiny quantum computer made of two quantum particles, known as qubits, that performed calculations. [Twisted Physics: 7 Mind-Blowing Findings]
At the subatomic scale, where the odd rules of quantum mechanics hold sway, physicists describe the state of systems through a mathematical construct called a wave function. This function is an expression of all the possible states the system could be in — even, in the case of a particle, all the possible locations it could be in — and the probability of the system being in any of those states at any given time. Generally, as time passes, wave functions spread out; a particle’s possible location can be farther away if you wait an hour than if you wait 5 minutes.
By converting our sims to HTML5, we make them seamlessly available across platforms and devices. Whether you have laptops, iPads, chromebooks, or BYOD, your favorite PhET sims are always right at your fingertips.
Become part of our mission today, and transform the learning experiences of students everywhere!
In an incredible first, scientists have captured the world’s first actual photo of quantum entanglement — a phenomenon so strange, physicist Albert Einstein famously described it as ‘spooky action at a distance’.
The image was captured by physicists at the University of Glasgow in Scotland, and it’s so breathtaking we can’t stop staring.
It might not look like much, but just stop and think about it for a second: this fuzzy grey image is the first time we’ve seen the particle interaction that underpins the strange science of quantum mechanics and forms the basis of quantum computing.
The ORION™ Non-Linear Junction Detector (NLJD) detects the presence of electronics, regardless of whether they are radiating, hard wired, or even turned off. Electronics containing semi-conductor properties return a harmonic signature the ORION NLJD can detect when radiated with RF energy. An NLJD detects physical properties, and not energy emissions. Therefore, devices that contain circuit boards and their components, like cell phones, video cameras, and microphones can be detected by the ORION NLJD.
How does a non-linear junction detector work?
The NLJD antenna head is a transceiver (transmitter and receiver) that radiates a digital spread spectrum signal to determine the presence of electronic components. When the energy encounters semi-conductor junctions (diodes, transistors, circuit board connections, etc.), a harmonic signal returns to the receiver. The receiver measures the strength of the harmonic signal and distinguishes between 2nd or 3rd harmonics. When a stronger 2nd harmonic is represented on the display in red, it indicates an electronic junction has been detected. In this way, a hand-held ORION is used to sweep walls, objects, containers, furniture, and most types of surfaces to look for hidden electronics, regardless of whether the electronic device is turned on.
Early this morning, I was asked this question at Quora. It’s a pretty basic request of network administrators, including parents, schools and anyone who administers a public, sensitive or legally exposed WiFi hot spot.
Is there a quick and easy way to view, log, or otherwise monitor the web sites visited by people on your home or office network?
Yes. It’s free and and it is pretty easy to do.
It gets a bit trickier, if the individual on your network is using a VPN service that they have configured on their device.[1] A VPN does not stop you from logging their browsing, but all of their activity will point to the VPN address instead of the site that they are actually visiting. In that case, there is another way to monitor their activity. See note #1, below.
Before getting into this, I should mention that I believe that using covert methods to monitor a family member’s online activity is a terrible method of parenting. In my opinion, there are better ways to deal with the issue—parenting techniques that don’t undermine trust as they deal with safety.
I can think of at least three methods for logging the websites that people on your network visit. In the explanation below, we will focus on #2. For more information, dig into the notes at the bottom of this answer.
You can either…
Configure your router to store logs of visited IP addresses [2]
Set your router to use the DNS server at opendns.com, instead of the default server offered by your internet service provider. This involves a simple setting available in all routers. (Replace default DNS server addresses with 208.67.222.222 and 208.67.220.220)
You can set up a proxy which redirects web traffic to one of the computers in your house or a third-party service. This is how the monitoring software for parents and custodial services monitor or block web traffic.
In the remainder of this quick tutorial, we focus on method #2..
Once you configure your router to use the two DNS servers at OpenDNS.com, create a free account on their web site. Then, enable the logging feature. It not only shows you visited domains, it maps them into actual domain names and subdomains—making it easy to search, sort or analyze traffic.
You can download a spreadsheets and sort by number of visits or by the domains visited. Logs are maintained for only two weeks. So, if you wish to maintain a history, you will need to visit OpenDNS and download them regularly. (Check their user forum. Someone has created a safe, single-line DOS command that downloads these activity logs to your PC).
[1] VPN, Onion Routing and Encryption
If an individual in your home or office is using a Virtual Private Network [VPN], they are effectively covering their tracks with method #3, above. You can see their connection to the VPN service, but that service is either trusted to destroy logs of visited web sites, or anonymize traffic, by routing it through a chain of users that have no way to back-trace and identify the requester’s address.
Since their traffic originates on your network, there are other things you can do to monitor their activities. For example, if they are not using end-to-end encryption, you can use method #3 yourself, to route data in and out through your own PC or service.
[2] Logging the IP address or domain of visited web sites is not a feature of all routers. I have three recent model routers — and only one of them has a feature to log traffic in and out of the network.
[3] OpenDNS cannot discriminate the individual device in your home or office that has accessed websites that it logs. The logs include the traffic for all HTTP access that originates through your internet service subscription.
But some remarkable feature of OpenDNS (other than it being completely free):
a) It speeds up your overall internet experience noticeably! Like Google’s free DNS service, it is more robust and more redundant than the default DNS settings recommended by your internet service provider.
b) It maps every IP address into a domain name. So when you log in to check your logs and statistics, you don’t need to figure what the numbers mean. You view a list that makes sense. You can even search for certain words or web sites.
c) It permits you to block websites based on a very rich set of 100 criteria, including violence, adult content, hate speech, etc.
d) It offers graphs of your network access including overall volume. An example is shown here:
On the face of it, this seems an unlikely proposition. Natural sources of radio waves include lightning, stars and pulsars while artificial sources include radar, mobile phones and computers. This is a diverse list. So it’s hard to see what these things might have in common with bacteria that could be responsible for making radio waves.
But today, Allan Widom at Northeastern University in Boston and a few pals, say they’ve worked out how it could be done.