‘Space-Time Cloak’ to Conceal Events

The study, by researchers from Imperial College London, involves a new class of materials called metamaterials, which can be artificially engineered to distort light or sound waves. With conventional materials, light typically travels along a straight line, but with metamaterials, scientists can exploit a wealth of additional flexibility to create undetectable blind spots. By deflecting certain parts of the electromagnetic spectrum, an image can be altered or made to look like it has disappeared.

Previously, a team led by Professor Sir John Pendry at Imperial College London showed that metamaterials could be used to make an optical invisibility cloak. Now, a team led by Professor Martin McCall has mathematically extended the idea of a cloak that conceals objects to one that conceals events.

“Light normally slows down as it enters a material, but it is theoretically possible to manipulate the light rays so that some parts speed up and others slow down,” says McCall, from the Department of Physics at Imperial College London. When light is ‘opened up’ in this way, rather than being curved in space, the leading half of the light speeds up and arrives before an event, whilst the trailing half is made to lag behind and arrives too late. The result is that for a brief period the event is not illuminated, and escapes detection. Once the concealed passage has been used, the cloak can then be ‘closed’ seamlessly. Continue reading …

Related Posts

Zentyal Disaster Recovery service published We're excited to announce that today we are releasing a brand new service: Zentyal Disaster Recovery! This new subscription add-on allows you to store...
Is TrueCrypt dead? Based on the wording of its license, there was always a question mark surrounding the open source-ness of Truecrypt. But that's not the topic of this ...
How to configure Ubuntu 14.04 server to forward root mails to your email address This short tutorial shows how to configure a Ubuntu 14.04 Cloud server to forward system-generated mails sent to the root account to your email addres...
More than 300,000 routers in homes and small businesses hacked A security research outfit has released a report which revealed that more than 300,000 routers in homes and small businesses have been hacked. Team...
A car of the future with DIY parts that can be made using 3D printers A car with do-it-yourself (DIY) interior parts that can be made using 3D printers will be a bestseller for the obvious reasons. And it could be coming...
French Military contributes code to Mozilla Thunderbird The latest release of the open source email client Mozilla Thunderbird contains code from the French Military. The involvement of the Ministry of Def...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention ‘Space-Time Cloak’ to Conceal Events — LinuxBSDos.com -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*