Sunday, April 19, 2026

A series of scientists and one general disappeared from the U.S.

 

“The 10 Scientists Who Vanished or Died from 2023-2026: (Top L-R) Steven Garcia, William McCasland, Anthony Chavez, Melissa Casias, Monica Reza, (Bottom L-R) Nuno Loureiro, Carl Grillmair, Michael Hicks, Frank Maiwald, Jason Thomas. “(https://www.ibtimes.co.uk/white-house-investigates-scientist-deaths-disappearances-1792020)

Retired Major General William Neil McCasland, 68, left his Albuquerque home on foot at approximately 11 a.m. February 27 and has not been in contact with family or friends since, the sheriff’s office said in a news release on March 6. He disappeared on February 27,2026. The position of that person was interesting. He was the head of Wright-Patterson Air Force Base research laboratory." (https://edition.cnn.com/2026/03/11/us/retired-air-force-general-fbi-search)

And he oversaw many secretive military projects. And this is why his disappearance is a risk for national security. Sometimes this case is reported as “UFO general disappearance case”. Another interesting thing is this. Another nine scientists who worked in classified projects have disappeared or died since 2023. Those people worked on. Space material research. And other kinds of research projects. Like nuclear weapon research. There is a list of those cases in the attachments. The thing. What makes those cases interesting is that. They had a connection with McCasland. 

So, does the disappearance of McCasland. And those scientists have some connection? And what is that connection? I think. That many people who worked on the military projects knew McCasland. And then we can say. It's a very low probability that those deaths and disappearances are coincidences. The work that people like Monica Reza, who worked with spacecraft materials, did. It can also connect to high-speed hypersonic aircraft. 

Monica Reza worked with a superalloy that should withstand extreme temperatures and pressures. “Monica Reza went missing on the morning of June 22, 2025, in the Angeles National Forest while hiking with two experienced companions who were exploring the popular Mount Waterman Trail, according to a Facebook page dedicated to finding her.” (NY Post). The fact is that. There are many coincidences. And those cases should be solved. The sources, like Newsweek, connected McCasland with the UFO community. So we should ask, are those disappearances some kind of abductions? And is there something that people should not know? 


https://edition.cnn.com/2026/03/11/us/retired-air-force-general-fbi-search


https://www.foxnews.com/politics/missing-general-scientist-deaths-tied-secret-us-work-prompt-white-house-probe


https://www.ibtimes.co.uk/white-house-investigates-scientist-deaths-disappearances-1792020


https://www.independent.co.uk/news/world/americas/william-neil-mccasland-missing-new-mexico-ufos-b2932511.html


https://nationaltoday.com/us/nm/albuquerque/news/2026/04/07/mysterious-disappearances-of-experts-linked-to-ufo-research/


https://www.newsweek.com/who-is-william-neil-mccasland-ex-us-general-linked-to-ufo-research-missing-11609887


https://nypost.com/2026/03/21/us-news/rocket-scientist-with-professional-ties-to-missing-gen-william-mccasland-disappeared-under-similar-circumstances/


Six clicks separate people from each other.



“A long-observed social phenomenon suggests that people across the globe are separated by surprisingly few connections. Credit: Stock” (ScitechDaily, Scientists Prove There Are Just Six Degrees of Separation in a Social Network)

“In a networked world, we are about six steps away from another individual. In the world of the Internet. That means six clicks separate us from any person who uses the internet. This is one of the most incredible ideas. The idea dates back to 1967. Harvard psychologist Stanley Milgram conducted an experiment. He sent letters to random people and then asked them to send those letters to their closest friends. This is a classic chain letter experiment. And of course, Milgram asked. People. Those who participated in that network test wrote their names on that paper. The idea was that Milgram wanted to know how far a random person was from Milgram. Most of those letters never return. But in letters. Those that returned were about five to six names. Before they returned to the hand of Milgram. 

This means that there are approximately six people between members of the same network. This causes an interesting thing about networks. People can be members of the same networks. But they ever. Head of each other. And this causes. The situation that we all know. Some people might say that somebody. That person knows, knows that third-party person, or knows somebody who has that name. Those people don’t necessarily know the person. But they know the name. 




“Milgram concluded from his small-world experiments that any two random people in the United States would be linked by a chain of (on average) six steps.” (Wikipedia, Small-world experiment)

In that image, the balls are people who are not involved in the chain. But those people transmit information to their own networks. The same models are used to track the origins of the epidemics. Or, those models can also be used. To track. Things like drug dealers. When some outside actor transfers information into their own networks. That causes a situation where information spreads to global networks. 

“The small-world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small-world-type network characterized by short path lengths. The experiments are often associated with the phrase "six degrees of separation", although Milgram did not use this term himself.  (Wikipedia, Small-world experiment)

But then. We can think. About the networks and their problem. When we think that we all have two or three good friends, we must understand. A couple of things. In information networks, “friend” is not necessarily. The individual person. The friend is the thing. There, we share information. We all have more than just two relationships. If we think that we are three actors, who tell everything to each other. We forget. We can think that humans have two hands. They might all have two connections. Those two close friends are only one connection. And then we have the connection. None of our three people ring knows. When we share information with those outsiders that causes a situation, that information starts to spread in the network. 

Things like married people can use or look at each other’s Facebook accounts. The “Friend” can also be some group. Like a soccer team discussion forum. If we have two trusted fiends in the information network, we often forget that those fiends also have two trusted friends. But there is a possibility that those people or groups. That we think of as “fiend”. Might not know each other. So we might know those two people. But maybe one or both know some third-party member. This third-party member. Is the thing. That causes information to spread through the network. In the networked world. We don’t know. Who really is the person we see on the net? People can claim. That they are even the Secretary General of the U.N. 

The model. That. Between every user of the net. Cause interesting thoughts. Six clicks. Separate us from the biggest chiefs in the business world. Six clicks separate us from a serial killer. And six clicks separate us from secret agents and drug dealers. This means. That the secret agent, the biggest boss, the serial killer, and the drug dealer. They are always part of our networks. This causes an interesting thought. 



https://scitechdaily.com/scientists-prove-there-are-just-six-degrees-of-separation-in-a-social-network/


https://en.wikipedia.org/wiki/Small-world_experiment


Saturday, April 18, 2026

The new research aims to find the answer to the question: what makes matter mass?




“A new experiment offers intriguing clues about one of physics’ deepest questions: the origin of mass. By probing an exotic, short-lived nuclear state involving a heavy meson, researchers uncovered evidence that particle properties may shift inside dense nuclear matter. Credit: Stock” (ScitechDaily, Where Does Mass Come From? Scientists Find Evidence of a New Exotic Nuclear State)

The mass is one of the biggest mysteries in physics. The question of what constitutes mass is a key element in physics. The mass has a straight connection. With gravity. There is a structure that binds quantum fields. Otherwise, it affects all three other fundamental interactions. When the matter binds quantum fields, the quantum field from outside tries to fill that space. And those fields pull particles and wave movement with them. This causes a situation that. Light can travel faster in a gravitational field than outside that field. This requires that the photon travels. 

To the gravitational center. The speed of light is relative. It’s relative to the speed at which its environment travels. So if the speed of the quantum field is 20 % of the speed of light, that means the photon travels 20 % faster if we compare its speed with the speed of a photon outside the quantum field. Because a photon is inside a quantum field, it travels in a gravitational field. It doesn’t break the laws of physics. When an object falls into a black hole through the event horizon. Its speed. Comparing with the environment is zero. 

When a photon or any other particle escapes from the gravitational field, its speed decreases. The impacting quantum field forms an electromagnetic shadow behind it. So the gravity center pulls energy out of the particle. So when a particle travels to the gravitational center. It will pull energy inside it. But when it escapes from that field, it must deliver as much energy as it got. 

But then. The particle tries to escape from that field. The particle must release or transfer as much energy to the field around it. As the field transitioned into it. When the speed of the field and the particle is precisely the same. The field cannot transfer energy into a particle. That is one of the reasons why nothing can escape from a black hole. The energy transition between particle and field ends. When they travel at the same speed. 



Impression of a photon rocket that could transport people to stars somewhere in the distant future. 

What if the gravitational center suddenly disappears? The particle will not need to deliver the energy that it got when it fell to the gravitational center. 

When a particle tries to escape from a black hole, the quantum field creates a shockwave ahead of it. If a particle tries to stop and turn around, the wave forms at the front of it. Another thing is the quantum shadow behind it. And that shadow pulls energy out of it. When the field travels .To the gravity center. With a speed 20% of the speed of light, the impact speed of the static particle and field is 20% of the speed of light. 

This means that the photon’s speed is 20 % lower if we compare the escaping photon’s speed with the speed of a photon that travels outside the gravity field. The photon can travel faster than other photons when it travels to a gravitational center. So, the photon that escapes from a black hole needs to use as much energy as it had when it traveled to the gravitational center. 

This paradox causes an interesting idea about crossing the speed of light. The speed of light is the cosmic speed limit. But if the fields travel to the gravitational center. With a speed. That is about 30% of the speed of light. And the speed of the hypothetical craft. It is about 75-80% of the speed of light; there is a possibility. The craft detonates the gravitational center. This means that the gravitational effect disappears. And that thing removes the need to deliver energy for escaping the gravity center. 

The explosion forms the impacting field. That speed is near the speed of light. And that causes a situation where the impact speed with craft and field is higher than the speed of light. 

Gravitation pulls objects. Like a river pulls woods and other things with it. There is a theory. That. There is a tornado-shaped structure or a small black hole in the middle of each particle. This means that particles are the halos of the quantum-sized black holes. The thing that makes those theories interesting is that reseachers in Brookhaven National Laboratories created quarks by colliding composite particles called hyperons. 

Those impacts formed quark-antiquark pairs. And the Brookhaven staff. Can detect those particle-antiparticle pairs from debris. Those collisions formed. The thing is that hyperons form quark-antiquark pairs when. It decays into two particles. The spin of those particles is opposite. And that makes them particle-antiparticle pairs. The effect that forms matter straight from energy. Or wave movement called the Schwinger effect. 

Colliding quantum fields form the whirl that starts to condense. That whirl forms in the borders of those impacting fields. The question is, what stabilizes those whirls or balls? The thing that stabilizes them is the thing that gives mass to matter. The matter is a condensed quantum field. But what condenses it? And what binds quantum fields in matter? 

Quantum fields are the common name for the four fundamental interactions. The time dilation and its connection. Mass and gravitation are well-known. The reason for that is that gravitation condenses quantum fields. And that thing slows the particle’s evaporation. Condensed quantum fields are the result, not the reason, for something that binds those fields. This means that gravitation interacts similarly with all other fundamental interactions. And that makes mass and gravitation interesting things. 


https://interestingengineering.com/science/scientists-observe-particles-emerging-from-nothing


https://scitechdaily.com/where-does-mass-come-from-scientists-find-evidence-of-a-new-exotic-nuclear-state/


Friday, April 17, 2026

Quantum-dot-based cryptography. Brings. Quantum internet. Closer than ever before.



"Cover highlight of the experiment. Single photons emitted by a quantum dot embedded in a photonic device are coupled into a fiber and encoded by ‘Alice’ into three distinct time-bin qubits. After ‘Bob’ performs the decryption, a sequence of quantum keys is shared between the users. Credit: Credit: Light: Science & Applications (2026). DOI: 10.1038/s41377-026-02205-9. Quantum dot–based time-bin QKD achieves stable, long-distance secure communication with practical performance. (ScitechDaily, Quantum Breakthrough: Unhackable Keys Sent Over 120 km Using Quantum Dots)

Researchers transmitted a quantum key over 120 kilometers by using quantum dots. This is a remarkable thing. The unbreakable internet is becoming a reality. In quantum-dot-based systems, the system uses a tool. That is like a pixel camera. The receiving pixel is against the transmitting pixel.

And the transmitting side can be the net of the nano-lasers. In quantum cryptography, the system encodes information into a physical object. In a quantum dot-based transmitter, the transmitter is like a computer screen, but the regular image pixels are replaced with nanolasers. 

When a quantum dot-based system transmits information. It can transmit it. As in the shape of a certain image. The image can be anything. The laser beams transmit that image to the receiver. This is one of the things that the system could do. The system. It can use different radiation frequencies. Like UV, infrared, and visible light. 

Or, even X-rays. The system can use photonic solutions. Their information is stored in a single photon. Optical systems are very hard to break by using eavesdropping. The quantum system could also use coherent radio waves. Or it can use coherent acoustic waves. 

The message can be shared over multiple frequencies. The system can also use spectroscopy as the encryption tool. The system can send an image of the object. But also the spectral image of the elements that form the object. This gives depth to the encryption. The key is the weakest point in the encryption. If the eavesdropper gets the key. That actor can open messages without permission. In quantum dot-based optical encryption. The eavesdropper must cut the laser beam. 

That changes the geometry of the information. And the system detects that thing. The quantum dot-based communication can also use this method. That information. Or. The TCP/IP protocol. Data packages are shared between different communication lines. Then the system sends them. At the same time. Or it can change the data channel all the time. So, when the laser transmits critical information, the other beams can transmit unnecessary data. And the eavesdropper must find the beam that sends important data from meaningless data. 

There is a possibility. Of using the so-called switched order to exchange keys. In that system, the system that normally receives information sends the key. The BizTalk goes like this: Transmitter: “Are you ready”? The receiver: “Yes. Here is the key”. 

In some versions, there is a third party, the encryption system, or keyholder , that shares keys. To the communication system. The BizTalk begins like this: “We (System 1 and System 2) want to talk, and we need the key”. Then, the third party in the system shares the key with those participants. In that case, the third party is the keyholder. That uses different communication lines than the system that shares other information. 

When the system uses quantum encryption, the problem is with the quantum keys. The system must get the quantum key to the receiver. There is a possibility. The system uses pre-installed keys. In this version, the courier transports the USB stick. That involves the key to the receiver. The system can use numbered images as the encryption keys. There are multiple ways to secure the key. 

The system can use a method. The number of images that it uses will be sent from the receiver. The system involves trillions of keys. And then it selects which keys it uses. On a certain day. The selector can be the receiver. There are multiple ways to encode those numbers. One is that the system must send those numbers at a certain time. And it can use a series of marks. There, the opponent picks only remarkable numbers. Those numbers can be replaced by letters. Or some other marks. 


https://scitechdaily.com/quantum-breakthrough-unhackable-keys-sent-over-120-km-using-quantum-dots/


Some people are concerned about the Claude Mythos program.


The “Mythos” is Anthropic Corporation’s most powerful tool. The tool is an AI-based vulnerability testing tool. The tool is created for “Project Glasswing”. Whose purpose is to develop new tools to map vulnerabilities in systems. The problem with that project is that all vulnerability testing tools are suitable for hacking. One of the things that disturbs people is that Anthropic didn’t offer its AI to the public. 

“So rather than make it widely available to Claude users, Anthropic gave 12 tech companies access via Project Glasswing, which it described as "an effort to secure the world's most critical software". (BBC)

This means that 12 companies can have access to all data on the net. 

Vulnerability testing is vital for the systems that should be protected against hackers. The Mythos tool is not public. And I think that the users must be accepted. For the user, by using some special methods. The main problem is that hackers will not tell people that they are hackers. They might look like regular vulnerability testers.

But those people can act as real attackers. The problem with hackers is that they can look like normal people. And they can use these kinds of tools to prepare. Or make cyber attacks. In the best scenarios. Those hackers can use a firm to order those hacking tools for them. Because some firm pays the bill. The hacker’s identity is not uncovered. 

“Ciaran Martin, former head of the UK's National Cyber Security Centre, told the BBC earlier this week the claim Mythos could unearth critical vulnerabilities much more quickly than other AI models had "really shaken people". (BBC)

"The second thing is that even with existing weaknesses that we know about, but organizations might not have patched against, might not be well defended against, it's just a really good hacker." He said.” (BBC)

The main problem is this: only good hackers can find the weaknesses that other hackers can use. The same programs that uncover malware. Can turn into malware testers. Hackers can use those tools to test their code against firewalls and virus scanners. The AI is a tool that can detect vulnerabilities faster than ever before. The vulnerability means. The hackers can use vulnerabilities only. If they know about them. And if hackers know some kind of vulnerability before the “good guys”. That can open up lots of data to bad boys. Some people believe and fear. The AI development. Turns so fast that nobody can control it. 


https://www.anthropic.com/glasswing


https://www.armorcode.com/blog/anthropics-claude-mythos-and-what-it-means-for-security


https://www.bbc.com/news/articles/crk1py1jgzko


https://www.forbes.com/sites/jonmarkman/2026/04/08/what-is-claude-mythos-and-why-anthropic-wont-let-anyone-use-it/

Thursday, April 16, 2026

Quantum dot-based technology can be a new tool against stealth technology.


“Artistic rendering of scanning-exciton optical nanoscopy (SEON) showing correlative dual-parameter mapping of light-field intensity and local density of optical states (LDOS) on a single gold nanoparticle (right), a plasmonic trimer consisting of three nearly-touching gold nanoparticles (left), and a waveguide-interfaced photonic crystal nanocavity (middle). The light-field intensity and LDOS distributions are shown in red and blue colormaps, respectively. Credit: Xue-Wen Chen et al.” (ScitechDaily,Scientists Break Optical Limits With Quantum Dot-Powered Nanoscopy)

Quantum radar. It can be two-layer graphene. The system puts quantum entanglement between particles that are locked in those squares. The system should use particle pairs. In transmitting particle pairs. The outer particle is at a lower energy level. That particle transmits signals. And in receiving a particle pair, the outer particle is in the lower energy size, which allows it to transport information into the system. That kind of quantum dot-based technology can break the stealth material. In that system, the frame spins, and that makes it possible to create. The scanning Doppler radar.  

In some other versions, the system uses a cut nanotube. The nanotube forms the crown-shaped structure. And in the middle of the nanotube is the antenna that transmits. The nanotube spins around that antenna. And that allows it to create the nanotechnical Doppler radar. The main problem. With Doppler radars. The antenna must move. 

So. That it can work right. The reason for that is this. The same antenna cannot transmit. And receive at the same time. The moving antenna makes it possible. That. The angle of the receiving antenna changes. This makes it possible. To determine the location of the point where signals reflect. Normally, the radar has a light parabolic shape, which makes it possible to determine the distance to objects. Another version. It is easier to use the change of frequency when the object comes straight to the radar. 





“DTU researchers have invented a nanolaser constructed in a semiconductor membrane that causes electrons and light to gather in a small area (blue shadow). By using light instead of electrical signals on microchips, data speed can be increased and energy loss reduced. Credit: Yi Yu” (ScitechDaily, Scientists Create Tiny “Nanolaser” That Could Revolutionize Future Computers)

Those transmitter-receiver antenna pairs can have an adjustable angle. This allows them to measure distance to the target. Very accurately. In those cases, the other antennas can send plus, and the other transmitter antennas can send A minus mark. Radio signals. Those signals form an electric arc to the target. 

This is important when something comes. Straight ahead to radar. The quantum dot-based radar can also use moving structures. 

Sometimes it’s discussed. About the possibility of using things like helium atoms as quantum radars. The atom’s core acts as a transmitter. And electrons act as a receiver. The system can also use things like excitons. The hole acts as a receiver. And the electron. Which orbits the hole act as a transmitter. Those exciton-based systems are already in use. 

In the laser-based systems. They can use the one-pixel scanner. And the nano-lasers. Those one-pixel systems can be in a frame that spins around the laser. 

The new nanotechnical lasers can act as pairs with the pixels that can receive the reflection. The laser. It can have a frame. Those receiving pixels are in that frame. As a circle. This makes it possible to create optical lidar (”laser radar”) that can scan surfaces and operate over longer distances. 


https://scitechdaily.com/scientists-break-optical-limits-with-quantum-dot-powered-nanoscopy/


https://scitechdaily.com/scientists-create-tiny-nanolaser-that-could-revolutionize-future-computers/


https://en.wikipedia.org/wiki/Doppler_radar


https://en.wikipedia.org/wiki/Exciton

Monday, April 13, 2026

Could the CIA really have a sensor? That sees. A human heartbeat from 40 kilometers?



Could the quantum sensor called Ghost Murmur be real? And if it's real, could it make the TRV technical remote view possible? The answer is “yes” if that sensor is true. And it could use. The magnetic field interacts with the brain. And the brain’s electric activity. To register human thoughts. The AI decodes the EEG that the system captures. The media claimed that the fallen U.S. F-15 weapons officer was found by Iran using the mysterious Ghost Murmur sensor. The media reports that this sensor could read a human heartbeat. From a distance of 40 km. It’s possible that this sensor is disinformation.

And there is. Of course. A possibility. That. The pilot used some wearable technology. Like implanted microchips. Or simply. Some kind. An intelligent watch for location. But. If that quantum sensor is real. And it uses the EKG, which means the same system. It can. Someday, read even thoughts by observing EM fields around human brains. There is also a possibility that. This kind. Of a quantum system. It can someday transmit information into the human nervous system. The idea is that. Those systems inject information into the nervous system, benefiting the electrical activity in the brain. 

The fact is that the system could be some kind of quantum radar. Those systems can be very accurate, and perhaps they could detect the heart's electrical activity from a great distance. Another version is that this sensor could detect the heartbeat by following the acoustic waves from the target’s chest. Another version could be more traditional. The system could track the signals from the implanted microchip. Those microchips could be really flat. And installed at the points, they are almost undetected. 




Those microchips could also be GPS systems that are in the nasal cavity. It’s possible that the code from the jet fighter’s radar or from satellites can activate those sensors, which can communicate with GPS or even with a cell phone. Those sensors can be really flat. And they can be put on the skull. Of the person. That allows them to observe electric activity in the brains all the time. 

But if Ghost Murmur is real, and it's the quantum sensor that can observe interactions between brains. And their interaction with the quantum fields. Around the brain, we can say that the next stage is. It could be the system that can read thoughts from a long distance. Researchers think. That consciousness is far more than brains. The idea is that the electric activity in the brain causes interaction between quantum fields around it. 

This thing can make it possible. Quantum systems. They can detect and decode the EEG by using those quantum fields. This allows for remote mind reading. Electric activity in the brain. Causes interaction between the brains and quantum fields, mostly electromagnetic fields. There is a possibility that if the sensor is sufficiently accurate, it could detect those changes. 

But it could also make it possible to transmit data straight to the nervous system from a long distance. We know that this kind of technology fascinates people. Technical remote view. Without any implanted systems, these would be the most fundamental and dangerous ideas in the world. Technical remote view TRV bases the systems that can read EEG from a long distance. The sensor. It can be the microchip group on the skull. Or. It can be the Brain-Computer Interface. The AI can translate the EEG that the radar captures into images, and thoughts that the computer can introduce on the screen.  


https://finance.yahoo.com/sectors/technology/articles/ghost-murmur-lockheeds-quantum-heartbeat-113109106.html


https://militarymachine.com/ghost-murmur-cia-quantum-heartbeat-detection


https://scitechdaily.com/epic-brain-showdown-reveals-surprising-origins-of-human-consciousness/


https://scitechdaily.com/this-powerful-new-brain-tool-could-tell-us-how-consciousness-works/


https://scitechdaily.com/what-if-consciousness-exists-beyond-your-brain/


https://www.sofx.com/cia-deploys-ghost-murmur-quantum-sensor-to-track-airmans-heartbeat-in-iran-rescue/



Saturday, April 11, 2026

Bacteria. It can be a tool for beating cancer.


"Engineered Synthetic Bacteria Medical Biotechnology. Scientists have discovered that a naturally occurring bacterium isolated from amphibian intestines may possess extraordinary anticancer properties. Credit: Shutterstock" (ScitechDaily, Naturally Occurring Bacteria Completely Eradicate Tumors in Mice With a Single Dose)

The new bacteria-based treatments for cancer can give hope to people. The bacteria used can be genetically engineered or otherwise trained to search and destroy cancer cells. The training can happen. By growing bacteria on the nutrient layer, which is made of cancer cells. Another version. It is to connect the genome to bacteria. Which makes it “think” cancer cells as food. The genome can be taken. From the immune cells that try to fight against cancer. In an ideal case, the bacteria. This is used for this kind of therapy. It can be taken straight from nature. 

Genetically engineered bacteria can also boost the immune system. The key element in cancer therapy is to find. And destroy so-called zombie cells. Zombie cell. Means cell whose mission is over. But the apoptosis is not done. That can cause damage to telomeres. It can cause a situation. That cell will not die when it should. This means the cell continues its existence, and it tries to drive. Its program. Another time. When a cell performs its duties. Its metabolism causes damage to its DNA. Sooner or later, those damages are so large that the cell can accomplish any missions. And it loses its ability to control the cleavage. 

This forms the cell into a cancer cell. The process that turns a cell into cancer begins. From a zombie cell stage. When a zombie cell divides, it can form only another zombie cell. And that causes problems. In the case of cancer. Something disturbs the immune cell’s ability to detect those zombie cells. Normally, a cell gives chemical marks. 

The cancer cell’s ability to steal nutrients can turn against it. This means that the nutrient carrier cells can be turned to carry cytostatic in the nutrient molecules to cancer cells. The idea is that the action of the nutrient carrier always selects the cancer cell. It can make those nutrient carriers. To carry cancer medicine to cancer cells. 


That its mission is almost over. That means the cell calls. The immune system. To pick it up. But those immune cells’ mission is just. To collect garbage. The necrosis itself comes from the cell’s DNA. The main problem. With cancer therapy. It is the immune system that treats cancer cells. As stem cells. Cleaning zombie cells from the body can extend people’s life span. The new immune therapy can be based on the idea. That cancer medicines bring chemical marks to cancer cells, which makes the immune cells treat them as enemies. The therapy. It can benefit. The cancer cell’s ability to call lots of nutrient-carrying cells. 

When a nutrient carrier. should select the cell. There, it delivers nutrients. It always selects cancer cells. This also happens in cases. The macrophage calls a nutrient. So, macrophages are weak. When they try to destroy cancer cells. The bacteria that attack cancer cells. Can use those cancer cells as nutrients. This removes one problem with cancer therapy. 

The cancer cell calls those nutrient carriers. And if the nutrient involves an antigen that calls macrophages, those macrophages know that they should attack. 

If those chemical marks are in nutrients, the cancer cell pulls more of them inside. Than the cells around those cancer cells. So, the cancer cell’s ability to steal food turns against it. This ability means that the cancer cells pack. Lots of those antigens. Into it. Another version. It is to create nutrient carrier cells. That carries nutrients only to cancer cells. Then, inside those nutrient bites can be  cytostates, or DNA that orders those cells to die. This is one of the things that nanotechnology allows researchers to create. 


https://scitechdaily.com/naturally-occurring-bacteria-completely-eradicate-tumors-in-mice-with-a-single-dose/



A Chinese portable electromagnetic gun can be far more dangerous than anyone expected.



To be dangerous, the railgun must not reach hypersonic speed. The speed of a normal bullet is enough to make those systems dangerous. The railgun can be connected with the automatic launch system, which takes an image of the target. It measures the air pressure, wind, target’s distance, precise position, and speed. And then. The operator aims the gun, and the system shoots the ammunition automatically. The system. It can also use intelligent bullets that the laser point aims to target. 

The system takes an image of the target. And then the system transfers it in the bullet, which uses its wings to drive it into the target. This allows the shooter to shoot precisely behind visual obstacles. The railgun system can also shoot small drone helicopters that fly over enemy heads. And then those mini copters can shoot those targets by using bullets inside them. The system would be. A little bit like the CBU-97 Sensor Fused Weapon, but smaller. The 20-40 mm version of this system is possible. To shoot through the portable railgun or grenade launcher.

Portable railguns reach a very high rate of fire. That means that the system can act as a portable version of the minigun. But the electromagnetic launching system makes it more flexible than regular guns. And another thing is that those electromagnetic weapons are not jammed in the same way as normal guns. The EM gun doesn’t need gunpowder, and that’s why it can act in very wet conditions. The main problem. With those guns is the battery system. Those batteries are heavy. They are as easy to change as the magazine of the gun. The system doesn’t cause flash in the dark. To be dangerous, the gun must not send ammunition. 




CBU-97 Sensor Fused Weapon’s tactical diagram. The small-sized man-portable version of this weapon. It is maybe under development. 

With hypersonic speed. The system can adjust the speed of ammunition from high subsonic to high supersonic. The speed of 9 mm. A Parabellum bullet is enough to kill a person. The small-sized EM guns don’t cause explosive alarms. The system can accelerate ammunition by using an electric arc. And then Gauss's track accelerates the ammunition. This kind of system can shoot 1000-3000 rounds per minute. 

The small railguns can be mounted on the drones. And the lack of recoil makes them suitable for small drones. Small drones. They  can be equipped with centrifugal cannons. Centrifugal cannon. It is just a spinning plate. The problem is that. The muzzle velocity of centrifugal cannons is not as high as that of magnetic cannons. 

The system that includes both systems. Centrifugal and magnetic accelerators can give far higher muzzle velocity and rate of fire than centrifugal cannon or magnetic cannon alone. 

The rate of fire could rise far higher if Gauss’s track is connected to a centrifugal cannon. The centrifugal cannon is a spinning plate that can guide those rounds to Gauss’s track. The system can drop metal balls onto the spinning plate. And then the hole in the frame lets those metal balls travel into the magnetic accelerator. 


https://brobible.com/culture/article/china-handheld-electromagnetic-railgun/


https://interestingengineering.com/military/china-electromagnetic-cannon-tech-coil-gun


https://en.wikipedia.org/wiki/CBU-97_Sensor_Fuzed_Weapon

Friday, April 10, 2026

Is AI just a tool?


“A new study explores how interactions with generative AI may influence the way people form and reinforce beliefs, particularly when technology becomes part of everyday thinking processes. Credit: Stock” (ScitechDaily, Is AI Really Just a Tool? It Could Be Altering How You See Reality)

Somebody thinks. That AI is just another wheel. The AI is something that we use, and that’s it. But. The big thing. In AI, it is that. It’s far more. Than just some kind of tool. The AI is a flexible model for information. AI is like a human; it just doesn’t create information from emptiness. It processes information. That it gets from different sources. The system involves an algorithm, the program that collects information from sensors and databases. Another thing. In. AI is a computer program. The AI collects and processes a lot of data. But the problem is that. It uses databases. It doesn’t actually know if the information is false or true. 

In the same way, AI doesn’t think for itself about whether something is moral or ethical. The user teaches AI. And. The user selects what is right or wrong. And that is dangerous. There are people who are not normal. And if those people train an AI agent. That thing can turn into a catastrophe. The AI itself doesn’t cheat. It’s programmed to cheat. 


But humans either automatically know. Is the information. That we get true or false. Another thing is that the AI has an addictive psychological ability. Users select AI. That they feel most comfortable. This means that programmers do a lot of work to create AI that pleases users. And that is the thing that sometimes gets too far. The AI is a tool that is coming. The AI. It can have similar effects to net porn and some computer games. The AI can addict people. And they spend too much time with it. So, they get a headache. Sleepless and many other things, when they create things with AI.

 AI might look and feel like. A real human. It can discuss with people. And that forms an illusion that there is a human on the other side of the net. The AI. It can mimic feelings. And give advice. That feels very effective. But there are limits to the AI. And its use for things like a therapist. The AI should not have access to give psychotherapy. And the second thing is this. There must be some limits on things. That the user can ask the AI to do.  If a person asks AI to complete violent requests, they should have access to, or the order to, call a psychologist. 

There must be some kind of protocol that allows AI to pick dangerous people, like serial killers and suicide candidates. We know that there are lots of people. Aho asks the AI something that they would not dare to ask a real humans. The AI is a tool that can be a very good customer service agent. But the same thing that makes it a perfect customer service agent makes it a bad psychotherapist. The psychotherapist must dare to say if something is not as it should be. 

The AI has an algorithm that pleases the user. And in some cases. The AI tries to please the user at the wrong moment. The AI must have access to say “no” or refuse to do things that people ask. In the cases of depression, the AI that pleases the user can cause horrible things. When we say that AI is safe, we mean that the AI is safe for regular people. We don’t normally think that some very dangerous people can use AI. In those cases, the AI can incite people to make decisions. That causes bad things. The AI is a tool. That has a very big effect. 


https://scitechdaily.com/is-ai-really-just-a-tool-it-could-be-altering-how-you-see-reality/


Wednesday, April 8, 2026

Optical encryption boosts networks.





“The image conceptually represents the compact, chip-scale platform integrating the 5×5 VCSEL array and custom beam-shaping optics to create a structured grid of uniform square spots. Credit: H. Safi (University of Cambridge)” (ScitechDaily, Forget Wi-Fi This Laser Tech Hits 360 Gbps at Half the Power)

Encryption protects information that travels on the net. But it also protects the system from unauthorised code. If the bit that travels to the system’s gate is wrong. The system denies access. To the system. This also makes it possible. To use the same data line with multiple devices. The same optical fibre or laser beam. It can transmit information to multiple devices. At the same time. The encryption process means that each participant. 

Of the receiving system cloud, like drone swarms, can take their individual orders. The idea is that the lidar system can use the broadcast address. Or the individual participant can pick. The “personal” orders by blocking others. Than the bits that are meant for that participant. The user can give orders to the entire cloud by using the broadcast address. And then. Click on one participant, which means the participant knows. 

That the next orders are for it. When the operator clicks the icon or the point. There, the drone, etc. is. The drone sends BizTalk information to the transmitter. The BizTalk includes the individual receiving address. And then the system can start the private communication. The optical communication means that drones can have small screens there are certain images. Those images can tell a certain. The individual drone that. The next commands are for it. 

The primary concern with WiFi in secure communication is that it can be eavesdropped upon. The laser-based communication is safer. But it doesn’t completely solve those problems. There is a possibility that using scattering effects, such as micro- or nanoparticles, may make the laser beam visible from the sides. When a nanoparticle goes into the laser beam. It can aim part of that radiation to the sides. 

This is one of the weaknesses in lasers. Another thing is that. The laser beam must have a straight line of sight to the receiver. The same thing. It can make it possible to use laser communication in a room. The laser beam can be directed to the glass box.  There are nano-particles in the box, and that makes the thing look like a light bulb. The receiver can see that thing from every side. And it can make this type of communication more secure than traditional WiFi. The data can travel between rooms through optical fibres. 

When we look at. The laser-based communication, the laser beam, or the laser beam pack, can form the mosaic. That mosaic can be used to form images. The image is the thing. That acts as one of the encryption keys. If that mosaic image. Which could be geometrical. Or it can portray some  character, it's right, the system reads the bit. If that image is not in its memory, the bit is denied. In those cases. 

The image is the key that opens the system’s gate to the message. The message is, of course, open for the system. Only if it travels through the gate. This means that the encryption also protects the system from malicious code. 

The encryption prevents the system from opening its gate for unauthorised code. 

There is a possibility that laser holograms can replace the radio-based WiFi in secure data communication. The hologram. It can have a certain shape. Like a statue. The receiver can use a regular camera to recognise binary communication. 

The system can use quantum or semi-quantum communication. The shape of the hologram statue. Tells. The receiving system receives information. That the system transmits on purpose.  The shape of the hologram acts as a key that activates the decoding system. If the image that the system sees is wrong. And. If it is not stored  in its memory, the system will not recognise that information. 

This means that there are many ways to secure information. The hologram, the colour of the hologram and its blinking sequence. The hologram itself can also be covered behind the blanket. Or it can be in the box. That allows the user and the computer to see it. That hologram can look like some art. And that makes the encryption hard to break. The hologram will not transmit information if there are no authorised users in the same space. 


https://scitechdaily.com/forget-wi-fi-this-laser-tech-hits-360-gbps-at-half-the-power/

Tuesday, April 7, 2026

Why do people at the bottom want change more than people at the top?



Are futurologists right, or left-wing people? I mean politically. The main problem with ideology is this. The people at the top of the system are often more resistant to change than those at the bottom of society. The reason for that resistance is that those people are not working with the same thing as their henchmen. So, at the top of the organization, change is seen as a cost. They often think that it’s easier to continue with old methods. The new technology involves some risk. And because business is driven by money, not innovation, the old-fashioned technology is still used. Things. Like combustion engines, which are tools that are over 150 years old. 

This is why. The people. Those who pay lots of taxes. They are against change. The people who are working on the floor level want new machines. They are more open to new ideas than people at the top of the system. People think that this is the entire truth. But then. We can go back to the Soviet Union. The advanced forces took command in that nation in 1917. 

Then, for some reason, the most advanced state was left far behind the Western world. And the reason was again the same. People who ruled the state resist the change. In the 1970s, the Soviet Union was the leading state in robotics. They send Lunahod moon rovers to the moon. They tried to send a similar rover to Mars. At the same time. The Soviets tested systems that they could use on the battlefield. The Lunahod could act as a prototype for robot tanks. But. The lack of imagination. Caused those programs to be terminated. 

Once, the Polish Sci-Fi writer Stanislaw Lem introduced the idea of drone swarms in his novel “The Invincible”. The Soviets and other Warsaw Pact countries didn’t notice that idea. The idea of drone attacks is also introduced in some crime novels. In the novel The Brotherhood of the Rose. The novelist David Morrell made the main character eliminate his victim by using a remote-control aircraft. Those novels written in the 1960s and 1980’s. 

But still today, those killer drones came as a surprise on the Ukrainian front. We are known. Things like remotely controlled miniature hobby planes. For a very long time. Anyone can buy one of them from a shop. And anyone can connect a dynamite, a lighter gas bottle, and a remote launcher to them. But we are not prepared for those things. 

Then. Those innovations were lost. This caused a situation. That Western drove past the Soviets. The bureaucracy caused. Some innovations were old when the first prototypes came out from the production line. 

This is the main problem. All over the field. When we try to create fuels and systems that can make us independent from oil. There are only malfunctions and money loss. In those systems. We can say that hydrogen is a suitable fuel for turbine plants. But if we think that we should only make the system. This makes our vehicles independent of oil. We could use alcohol. Or the shaper saying ethanol as fuel. Ethanol is a good fuel, but it is a hydrocarbon. 





Lunahod 1


All hydrocarbons cause carbon emissions. Hydrogen is easy to produce. By using electrolysis. But electrolysis requires electricity. And the way. How electricity is made. Determines how environmentally friendly that fuel is. When we think. About things like solar panels, we see how ineffective they can be. The main problem is that those solar panels do not use any fuel. The effect of the solar panel can be boosted by using the turbogenerators. In those systems, the sunlight. It rises. The temperature in the water circuit. And this water or some other liquid will be sent through the turbine. This system can be used. As a cooling system with solar panels. This kind of hybrid system can increase the system’s power. 

Another thing. That could replace oil in engines is hydrogen peroxide or sulphuric acid. The system must only drive water in the cylinder chamber. And then inject peroxide or sulphuric acid into the cylinder. That means it's possible. The diesel engine can be turned. Into a steam engine that doesn’t require oil-based fuels. Production of sulphuric acid and peroxide requires a chemical factory. And at least the last one is very poisonous and corrosive. 

But the main problem is that. People still want to use so-called trusted methods. Wind energy can kill birds. Solar panels are not effective, and geothermal energy destroys roads. At the same time. Things like oil drills do not cause the fall of Earth's surface. Things like data centers are using too much electricity. But the thing called an ice rink doesn’t use electricity for nothing. The problem is that. When people have a negative attitude toward something new. That causes a situation. That people see only the negative. Things from those ideas. When we think that there is something wrong with the world today. We must realize that our economic solutions. Like full employment. They are from somewhere in the Roman Empire or Ancient Greece before the Roman Empire. 

We must accept that in the future. We cannot offer workplaces to all people. And people are not working traditionally. The problem with change is that. Modern new machines and AI. Make their work better and without breaks. Those systems are far more effective than human workers. Firms that use technology without prejudice are more effective than firms that don’t accept those things. Humans cannot compete with robots in simple mechanical work. Humans are more creative than AI. But in mechanical work, like serial production. Robots beat humans. Human operators can make the first object that comes out of the production line. But at the same time, they educate the AI. And AI and robots. Make the next objects in the series without humans. 

Advancing is not always positive. When we start to use new machines, we lose something. When we developed the Net, we lost something very important. We lost our physical community. Medieval people worked together. They met each other every day. They sing and work together. But there is also a cost for that community. Those communities were very intolerant of foreigners. Also, people who were different than others were sometimes even killed. So we must realize that. When we nostalize the past, we forget that everything was not good in those “good old times”. When we think that people who work in their homes are slaves of the net. And then we can call them to the office, and say that they are happier there, we must ask two more questions. 

Are we social in those offices, or are we sitting in a box, where there are no windows at all? Do we really talk? To each other? Maybe we do those things. But when we desire the way that people must come to the office, because they are happier that way, we must ask one thing: Do we underestimate our henchmen? Can we really think that our henchmen are happier in office, even if we are? When we sit in the office, we must ask: Are we really?  Making work that the employer pays for? Entire day? If our boss orders six work performances for the day, is it enough that we complete those works? And then the day is over. Or should we sit on our work computer for the rest of the day, and read some cartoons? The question is always: When we go to work, what do we actually do during the entire day? 

China brings. New innovations to markets in a very short timeline. And that means we can lose the technology race to the East. China can be far less bureaucratic. Than Western nations, when they want. They can make colossal space stations. And create AI-controlled drones. They create robot-operated, fully automated factories. And there is no problem with unemployment. We all want to resist things like AI-controlled combat robots. But if somebody. Brings them to the battlefield. That gives superiority to that operator. This is the reason why we are in the race. Or in the same wheel with AI and quantum development. 

Quantum systems and AI-controlled, synchronized morphing neural networks are tools that can make binary encryption ineffective. The problem is that if some hostile actor reaches quantum superiority. That actor can dominate the world. Quantum supremacy. Makes it possible to create cyber attacks that can paralyze an entire nation. A cyberattack that destroys civil and military databases can turn the entire country into a chaotic situation. What if we lost all our computers? 


https://futurism.com/artificial-intelligence/ai-jobs-automation-expert


https://www.innovationnewsnetwork.com/34-emerging-technologies-that-will-change-the-world/54326/


https://en.wikipedia.org/wiki/The_Brotherhood_of_the_Rose


https://en.wikipedia.org/wiki/The_Invincible

Sunday, April 5, 2026

Noise is the problem with quantum systems.



Above is Maurits Escher’s drawing Ascending and Descending. The drawing. It could portray the quantum system model. There is a quantum circuit where information travels. And the trunk. That mission is to deny the noise. The trunk is the cooling system that surrounds the quantum circuit. Because. In a quantum system, information travels in quantum entanglement from a higher energy quantum dot to a lower energy quantum dot. This means the quantum circuit is like a tower. 

The main problem. With quantum systems, the transmitting side in the quantum entanglement must be at a higher energy level than the receiver. That means it’s hard to make a closed quantum circuit that surrounds data. Every time data travels around the system, the last particle pulls the energy level in the system higher. 

Another problem is that. When the system processes information, it must bring information from other systems. This means that the other system must be at a higher energy level than the receiving system. But. Information rides in an energy beam, and that thing raises energy in the system. The free energy is the thing that destroys the quantum system. We can call this thing: “The last particle in the line problem”. When information reaches the last particle. The system must rise. The last particle’s energy level. Higher than the first particle. Energy level is. Or the last particle must transfer information to the hard disk. Then the system can adjust the quantum system again. 

Another solution can be the photons that are anchored around the laser beams. The photon is like a ring around that laser beam. The laser transmits information to the photon. Those laser beams also transport energy away from those photons. And that can keep their temperature stable. The important thing. It is to keep receiving particles at a lower energy level than transmitting particles. 

Information travels in the system between quantum points. The problem with quantum systems is the “noise.” The noise is free energy. In the system. Free energy forms because of the quantum field or glow that surrounds every quantum dot. When a quantum dot. Like a photon in quantum entanglement, the dot in a higher energy level transmits data to the quantum dot in a lower energy level. The information travels in the string, and when that wave movement reaches the receiver. 

It forms a flash in the quantum field. Or, the glow that surrounds the quantum dot. That flash transfers energy to the trunk. That causes oscillation in the groove that holds the quantum dot. Each quantum dot is like a light bulb. It shines energy. And that’s why those quantum dots cannot transfer all energy between each other. Lots of energy that carries information just travels into empty space in the quantum circuit. 




“In noisy quantum circuits, most of the work fades away—only the last few steps really count. Credit: Shutterstock” (ScitechDaily, Quantum Circuits Have a Hidden Weakness, and It Changes Everything)

The noise forms when energy in the system is rising. Data is traveling in the quantum circuit between superpositioned and entangled particles. The transmitting particle must be at a higher level than the receiving particle. The reason why the quantum system is so sensitive to noise is that all quantum dots are identical. Except that their energy level is different. This causes a situation where every oscillation escalates through the entire system. Because all of those particles have different energy levels, which causes the situation. Where those particles’ sizes are different. Because the transmitting particle’s size is a larger part of the energy, or information that travels between those quantum dots, it travels past the receiver. And that is one thing that forms free energy. 

Especially in the closed quantum circuit, data travels in a circle, and the system must raise the energy level within the circuit. The problem is in the cases. Where information reaches the last particle in the quantum system. Then the last particle must send information back to the first particle. So, the system must raise the last particle’s energy level over the first particle. And that means the system must raise the energy level in the entire system. The noise is another term for free energy in the quantum system. Free energy or entropy form. 

Because. Quantum entanglement cannot transmit 100% of energy to the receiver. The energy that travels between those quantum dots or particles affects the quantum glow around the particle. That glow transfers energy or wave movement between those particles and the trunk of the system. The energy level in the system. Cannot rise endlessly. If the energy in the quantum glow rises too high. That energy destroys the entire system. 


https://scitechdaily.com/quantum-circuits-have-a-hidden-weakness-and-it-changes-everything/

Tuesday, March 31, 2026

A tornado of light. Or. Optical makes the quantum internet closer.



If researchers want to create a quantum internet. They must protect information. In a quantum internet, information travels between superpositioned and entangled particles. But. For making that thing in real life, the system must have the ability to create a quantum channel through the air. Otherwise, the system must use nanotubes to create the channel. But. If the system can make the channel through the air, that turns the system itself more flexible than carbon nanotubes. The ability to remove magnetic fields, molecules, and radiation from the channel. That which travels through the air makes it possible to create the channel that allows quantum entanglement. To transmit information through it. 

Researchers created a spiral light. Today. Those spiral light formations are possible only on a microscopic scale. But if that technology turns more advanced. That system can be useful in a quantum network system. On the microscopic scale, the system can transmit information in photonic microchips. But in the long-range quantum network, information can travel through microscopic quantum channels. 

And that can turn many things. Like, long-range quantum communication into reality. The system makes. The spiral light, or light tornado. That can make it possible to create an electromagnetic wormhole through air. The system. It can use a spinning nanotube. And nano-technical lasers. The system could also trap a photon to orbit some object. And then the system makes the light-acoustic tornado through the air. The light tornado protects information that travels inside it. The light tornado makes it possible. To create a long-range quantum entanglement through that channel. This kind of optical system can make information transportation more secure than ever. 

But those kinds of channels make other things possible. Those systems can create a channel that allows particles to travel through the air. These kinds of systems can make things like ion cannons and antimatter-ion beams possible. Antimatter particles can be shot by using normal ion cannons. The main challenge is how to prevent. Those antimatter particles. From touching air. During their travel to the target. The antimatter beam could be possible. If. Something denies antimatter particles. Touch with material particles. If that thing is possible to deny the system, it can shoot antimatter particles through that channel.


https://interestingengineering.com/science/tornado-of-light 


https://scitechdaily.com/optical-rotatum-harvard-scientists-discover-new-structure-of-light/


Monday, March 30, 2026

Ultra-thin nanotubes and nano-technical lasers can boost a 6G network.



“Researchers have introduced an ultrathin carbon nanotube coating that can precisely control terahertz radiation, a part of the spectrum expected to play a major role in future 6G technologies. Credit: Stock” (ScitechDaily, New Carbon Nanotube Coating Could Supercharge 6G Technology)

Ultra-thin nanotubes and nano-technical lasers can boost a 6G network. And photonic- or non-electronic computer development. There are actually three main types of non-electric computers. 

A) Optical computers that use lasers or photons as data transporters. 

The first thing means that system transmits information using laser rays as a whole. When the laser shuts down, the value is zero. When the laser is on, the value is one. 

B) The photonic computer that uses quantum photon technology for storing and transmitting data. 

The second thing means. That. The system uses quantum technology, which packs information into single photons. 

C) Systems that transmit information in the form of radio or terahertz radiation. 




“DTU researchers have invented a nanolaser constructed in a semiconductor membrane that causes electrons and light to gather in a small area (blue shadow). By using light instead of electrical signals on microchips, data speed can be increased and energy loss reduced. Credit: Yi Yu” (ScitechDaily, Scientists Create Tiny “Nanolaser” That Could Revolutionize Future Computers)


Carbon nanotubes can absorb terahertz radiation. And that thing can boost the 6G technology. Additionally, it can boost high-power computing technology. The nanotube-based film. It can act as an insulator in high-speed data transportation. The system can transmit information through those nanotubes in the form of coherent radio. Or optical areas. The nano-sized lasers can send their laser beams through those nanotubes. 

Nanotube-based technology can also boost optical computing technology. Basically. An optical binary computer is similar to an electronic computer. The system shoots photons to the light meter. A certain light level is one. And below that level, light gives a value of zero. The binary photonic computer is sometimes mistakenly mixed with quantum computers. In quantum computers, there is more than one value. But in optical binary computers, there are only two values, 1 and 0. 

There are two ways. To make an optical or photonic computer. 

1) Fully photonic computer. There, the microchips and all components use photonic data transportation systems. 

2) Semi-optical systems. There are only wires that connect microchips. Or integrated microcircuits are replaced by optical data transportation tools. And internal data transportation or data processing in those microcircuits. Happens by using the electric method. In this case, the optical computer uses nano-scale lasers to transmit data. And nano-sized photovoltaic cells receive that information. 

But the problem with optical computers is the system that transmits information. Lasers are effective tools, but they need power. Theoretically, a photonic- or optical computer is more energy-efficient. Than the electric computers. The main problem is that. The photonic computers are not a useful solution. To computer energy problems. If the energy that the photonic system saves. Goes to high-performance cooling systems. But nanotechnology can be the answer. To that problem. Nano-sized lasers are much easier to cool than full-size lasers. 

Another answer could be the so-called wireless computer. The system can use radio waves. Or. Terahertz rays. The system must protect that information from eavesdropping and outside effects. In that system. The system uses nano-sized radio transmitters to transmit data. In the computer. And that makes nanotubes useful tools for. Those kinds of systems. 


https://scitechdaily.com/new-carbon-nanotube-coating-could-supercharge-6g-technology/


 https://scitechdaily.com/scientists-create-tiny-nanolaser-that-could-revolutionize-future-computers/


Saturday, March 28, 2026

Multi-dimensional light can offer secure data storage.



"Researchers developed a holographic data storage approach that stores and retrieves information in three dimensions by combining the amplitude, phase, and polarization properties of light. Credit: Xiaodi Tan, Fujian Normal University in China" (ScitechDaily, This Multidimensional Holographic Breakthrough Stores Massive Data Inside Light Itself)

Holograms, or multidimensional light, are tools that can store and transport information. The hologram stores information in multiple layers. And then the image recognition system observes that data. This is one way to secure communication. Secured communication requires multiple variables. The wavelength. Or the colour of the image, the image itself, and sub-images in the image are things that can be used for secure communication. The image can act as the bit. 

We can say that the image of Donald Duck. It can have a value of 0 or goofy. It can have a value of zero. The system can send those images in a series of other images. And. The receiving system picks only images that mean zero or one. 







"The image shows (a) the holographic data storage system schematic diagram, (b) a schematic diagram illustrating the complex plane for double-phase decomposition of complex amplitude and (c) an example of a checkerboard pattern for two phase values m and n. Also shown are (d) an example of the intensity distribution at the image plane and (e) an example of phase distribution at the image plane. In (f), the first (I) and second (II) records are shown, with the readout shown in (g). Credit: Xiaodi Tan, Fujian Normal University in China"(ScitechDaily, This Multidimensional Holographic Breakthrough Stores Massive Data Inside Light Itself)


The system can also use different images as flashes, and then. The system can measure the time the image is visible. The system must see. A certain image. At a certain time, it accepts the bit. The system that tries to break the code must have all information about the key that the system uses to open the messages. 

In this model, the time the image is visible. It is the thing that determines the value of the bit. If the system sees the image in 2 seconds, the value of the image in the computer memory is 1. And if the time is shorter, the value is 0, for example. The image that the system sees can also include a word or letter. And that makes it possible. To create an encryption process that is very flexible and effective. 

https://scitechdaily.com/this-multidimensional-holographic-breakthrough-stores-massive-data-inside-light-itself/

Friday, March 20, 2026

Quantum encryption took a big step. Because of the Talbot effect.




“ Researchers at the University of Warsaw have demonstrated a new approach to quantum key distribution that leverages high-dimensional encoding and a classical optical phenomenon known as the Talbot effect. By exploiting time-bin superpositions of photons, the system can transmit more information while relying on a surprisingly simple experimental setup built from commercially available components. Credit: Shutterstock” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

Quantum cryptography is a new tool for enhancing the security of communication. In that model, the system connects information to a physical object. It can share information on different routes. And that makes eavesdropping difficult. It can use a certain color. Or a certain image. As. The key that allows the receiving system to access information. 

 But it's also vital for cases where the binary system wants to transform data into a quantum mode. Without quantum cryptography, the system cannot exchange information between binary and quantum states. The thing called. The Talbot effect is the tool. That can make quantum cryptography more effective.  The quantum network can share information to travel on different routes. It can use certain images to encrypt and decrypt information. In a Talbot-effect-based quantum network, it is possible to create quantum superposition and entanglement between quantum dots. And that makes it possible to create a quantum network. But there are also many other ways to benefit from the Talbot effect. 





“Detection of time-bin superpositions with the temporal Talbot carpet. Credit: Maciej Ogrodnik, University of Warsaw” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

“The Talbot effect is a diffraction effect first observed in 1836 by Henry Fox Talbot. When a plane wave is incident upon a periodic diffraction grating, the image of the grating is repeated at regular distances away from the grating plane. The regular distance. It is called the Talbot length. And the repeated images are called self-images or Talbot images. “ (Wikipedia, Talbot effect)

Furthermore, at half the Talbot length, a self-image also occurs, but phase-shifted by half a period (the physical meaning of this is that it is laterally shifted by half the width of the grating period). At smaller regular fractions of the Talbot length, sub-images can also be observed. At one-quarter of the Talbot length, the self-image is halved in size, and appears with half the period of the grating (thus twice as many images are seen). At one eighth of the Talbot length, the period and size of the images are halved again, and so forth, creating a fractal pattern. Of sub-images with ever-decreasing size, often referred to as a Talbot carpet. Talbot cavities are used for coherent beam combination of laser sets.” (Wikipedia, Talbot effect)





“The optical Talbot effect for monochromatic light, shown as a "Talbot carpet". At the bottom of the figure, the light can be seen diffracting through a grating, and this pattern is reproduced at the top of the picture (one Talbot length away from the grating). At regular fractions of the Talbot length, the sub-images form.(Wikipedia, Talbot effect)

The second image introduces the Talbot-effect, and there could be  millions of possibilities in the encryption key. As we see, the possibilities. It could be the number of quantum dots. The system is used for encryption. Also. Things like a wavelength (color). And the time at which the image remains could be the thing. That helps to create an encryption key. Also. The system can calculate. How many times? In a time unit, the image blinks can be used to create ultra-secure encryption keys. Also, the time between blinks can be a participant. In quantum encryption. The system can also share information between multiple data lines. And then it can collect that information in the points. Of those quantum dots. 

When we talk. About the effectiveness of quantum cryptography, the diversity of methods. It keeps those things safe. If the system uses multiple different ways to encode messages and other data. AI-based intelligent systems can use multiple things. And ways to secure data. In that kind of encryption, the image that the system transmits could be a teddy bear. Then the receiving system sees the dataset that matches the teddy bear image. When the system receives other information that is not delivered in the image form of a teddy bear, it denies that information. This means the image acts as a key that allows the receiving system to open the message. 


https://scitechdaily.com/scientists-harness-19th-century-optics-to-advance-quantum-encryption/


https://en.wikipedia.org/wiki/Talbot_effect


Sunday, March 15, 2026

The new Chinese radars can be a threat to stealth.


"Representative image of a Chinese Shenyang J-31, circa 2014." (Interesting Engineering)

The gallium oxide diodes can make it possible to create compact radars for stealth fighters. This system enables the creation of new shapes for stealth fighters' profiles. This allows free aerodynamic planning and the use of more accurate shapes.  But these kinds of systems. Makes it possible. To create more advanced radar systems than before. The simplest way is to install more radars on aircraft. Those radars and other sensors can observe the area around the craft. Those kinds of systems. They can search for incoming enemy missiles and aim the weapons. Into positions where they came. 

The system. It can be created by using multiple radar arrays. This means that the new jet-fighters can have radar systems. Those are like mosaics. Each of the pieces of the mosaic structure is an independently operating radar. This means that radar. This means that some of those radars can operate in passive mode. When some other radar illuminates that plane, those systems can track it. The problem with jammers is this. They must operate at the same frequency as radars. 

"By improving detection capabilities against drone swarms, the technology could strengthen air-defense networks."(Interesting Engineering)

That they must jam. So if the system sees that it’s jammed. It can shut down transmitters. And then the passive system. That is the radar receiver antenna. It can be used to track the jammer. In the same way. The radar-warning systems can have a triangular measurement system. That system can point the radar’s location with a very high accuracy. 

The mosaic-based arrays can scan an area using many radio frequencies. At the same time. Those kinds of systems can be more immune to jammers than old-fashioned radars. The radar operates as an entirety. The AI connects the data that the radar group gets. Then that AI. It can connect that data with the data flow. Which comes from other sources. Like optical sensors. Those sensors. They can be in other aircraft. Ground-based, or drones. 

Or they can operate onboard the plane. This means that those systems can get more data than ever before. And that makes those systems more intelligent and more effective than before. Those systems are based. On network-based solutions, which connect the entire battlefield. Into one entirety. The system shares data between multiple systems. 

The new radar systems use AI algorithms to analyze and sort information flow. Those new systems can detect drone swarms and then separate decoy drones from real drones. But the problem is that all drones can carry explosives. And they can all be devastating. The system. That AI can search and identify targets with new accuracy. The AI algorithms can also analyze threats with new accuracy. This thing makes the attackers and defenders deadlier than ever before. 


https://interestingengineering.com/innovation/chinas-semiconductor-enable-compact-radar


https://interestingengineering.com/military/chinese-radar-identify-decoy-drones-real-targets

A series of scientists and one general disappeared from the U.S.

  “The 10 Scientists Who Vanished or Died from 2023-2026: (Top L-R) Steven Garcia, William McCasland, Anthony Chavez, Melissa Casias, Monica...