Redhotcyber<p>Una simulazione di un buco nero è stata realizzata usando un quantum computer</p><p>Per la prima volta, gli <a href="https://mastodon.bida.im/tags/scienziati" class="mention hashtag" rel="tag">#<span>scienziati</span></a> <a href="https://mastodon.bida.im/tags/cinesi" class="mention hashtag" rel="tag">#<span>cinesi</span></a> sono stati in grado di <a href="https://mastodon.bida.im/tags/simulare" class="mention hashtag" rel="tag">#<span>simulare</span></a> un <a href="https://mastodon.bida.im/tags/buconero" class="mention hashtag" rel="tag">#<span>buconero</span></a> e i suoi <a href="https://mastodon.bida.im/tags/effetti" class="mention hashtag" rel="tag">#<span>effetti</span></a> gravitazionali su un <a href="https://mastodon.bida.im/tags/computer" class="mention hashtag" rel="tag">#<span>computer</span></a> <a href="https://mastodon.bida.im/tags/quantistico" class="mention hashtag" rel="tag">#<span>quantistico</span></a>. L’esperimento apre nuove possibilità per studiare i fenomeni <a href="https://mastodon.bida.im/tags/cosmici" class="mention hashtag" rel="tag">#<span>cosmici</span></a> con l’aiuto delle tecnologie quantistiche.</p><p>Si tratta di uno <a href="https://mastodon.bida.im/tags/studio" class="mention hashtag" rel="tag">#<span>studio</span></a> pubblicato sulla rivista <a href="https://mastodon.bida.im/tags/Nature" class="mention hashtag" rel="tag">#<span>Nature</span></a> Communications, dove gli scienziati cinesi hanno utilizzato un computer quantistico per simulare il comportamento di una particella vicino a un buco nero. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/una-simulazione-di-un-buco-nero-e-stata-realizzata-usando-un-quantum-computer/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/una-simul</span><span class="invisible">azione-di-un-buco-nero-e-stata-realizzata-usando-un-quantum-computer/</span></a></p>