Technique Turns Computer Chip Defects Into an Advantage

Physicists at Ohio State University have discovered that tiny defects inside a computer chip can be used to tune the properties of key atoms in the chip. The technique, which they describe in the journal Science, involves rearranging the holes left by missing atoms to tune the properties of dopants — the chemical impurities that give the semiconductors in computer chips their special properties.

Though the technique is currently limited to the laboratory, it could prove valuable to industry in the future, as the continued miniaturization of cell phone and computer chips makes the performance of individual atoms in a semiconductor more important.

“The effect we discovered is probably already going on inside the devices we use every day — it’s just not being controlled,” said Jay Gupta, assistant professor of physics at Ohio State and principal investigator on the project. “Once industry takes this effect into account, our discovery could not only enable future computers with faster speeds, but could also enable new paradigms for computing — based, for example, on quantum mechanics.” Continue reading…

Related Posts

This is not just about your personal privacy Aside from revealing the names of specific programs that the government has been using to violate the privacy of all and sundry, to most people who ha...
The problem with NoSQL databases NoSQL databases, whether they are truly "no SQL" or "not only SQL," defer differ from relational databases in one major respect; they tend to be easie...
Intel Lifts the Hood on its “Single-Chip Cloud Computer” Chips that can simulate a supernova or predict a hurricane are yesterday’s goal, if Intel’s recently unveiled 48-core research chip is any indication....
Want to stop creepy online tracking? Help the EFF test Privacy Badger Privacy Badger is a new tool from the Electronic Frontier Foundation designed to stop creepy online tracking. It's an extension for Firefox and Ch...
Should Truecrypt be audited? Truecrypt is a cross-platform, free disk encryption software for Windows and Unix-like operating systems. It is generally considered a good disk encry...
Google to Gmail users: Forget about privacy. It’s so dead! Here's a report from The Guardian. Yep, it's that same UK online news site that's been making headlines for more than a month. The report cites...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Technique Turns Computer Chip Defects Into an Advantage -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*