Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.
@weddingweiser@berlin.social
2026-01-10 06:35:07

75 Quadratmeter Wedding weddingweiser.de/75-quadratmet

@heiseonline@social.heise.de
2026-01-08 17:37:02

Mini-PC: Asus stellt NUC 16 Pro mit RAM-Lüfter vor
Die neueste NUC-Generation bricht mit einer alten Tradition: Die Boards sind nicht mehr quadratisch.
heise.de/news/Mini-PC-Asus…

@@arXiv_physicsatomph_bot@mastoxiv.page@mastoxiv.page
2025-12-08 08:37:40

Nuclear spin quenching of the $^2S_{1/2}\rightarrow {^2}F_{7/2} $ electric octupole transition in $^{173}$Yb$^ $
Jialiang Yu, Anand Prakash, Clara Zyskind, Ikbal A. Biswas, Rattakorn Kaewuam, Piyaphat Phoonthong, Tanja E. Mehlst\"aubler
arxiv.org/abs/2512.05872 arxiv.org/pdf/2512.05872 arxiv.org/html/2512.05872
arXiv:2512.05872v1 Announce Type: new
Abstract: We report the coherent excitation of the highly forbidden $^2S_{1/2} \rightarrow {^2}F_{7/2}$ clock transition in the odd isotope $^{173}\mathrm{Yb}^ $ with nuclear spin $I = 5/2$, and reveal the hyperfine-state-dependent, nuclear spin induced quenching of this transition. The inferred lifetime of the $F_e = 4$ hyperfine state is one order of magnitude shorter than the unperturbed ${^2}F_{7/2}$ clock state of $^{171}\mathrm{Yb}^ $. This reduced lifetime lowers the required optical power for coherent excitation of the clock transition, thereby reducing the AC Stark shift caused by the clock laser. Using a 3-ion Coulomb crystal, we experimentally demonstrate an approximately 20-fold suppression of the AC Stark shift, a critical improvement for the scalability of future multi-ion $\mathrm{Yb}^ $ clocks. Furthermore, we report the $|^2S_{1/2},F_g=3\rangle~\rightarrow~|^2F_{7/2},F_e=6\rangle$ unquenched reference transition frequency as $642.11917656354(43)$ THz, along with the measured hyperfine splitting and calculated quadratic Zeeman sensitivities of the ${^2}F_{7/2}$ clock state. Our results pave the way toward multi-ion optical clocks and quantum computers based on $^{173}\mathrm{Yb}^ $.
toXiv_bot_toot

@mpsgoettingen@academiccloud.social
2026-01-20 13:20:39

We couldn't have hoped for a better advertisement for this year’s public lecture series than last night's spectacular show of northern lights!
The talks will deal with all the exciting aspects in the fiery relationship between the Sun and the Earth (in German). So if you want to learn more about the Sun, the aurora borealis, the dangers of solar storms, about space weather forecasting and more, join us for
"Im Feuerwerk der Sonne"

Vorderseite eines Flyers mit der Überschrift "Im Feuerwerk der Sonne". Kleinerer Text darüber und darunter: Öffentliche Vortragsreihe am max-Planck-Institut für Sonnensystemforschung Februar - Mai 2026. Von der stürkischen Beziehung zwischen Sonne und Erde. Im Hintergrund ein Bild das Sonne und Erde zeigt, unten am Seitenrand vier kleine quadratische Bilder mit Abbildungen von Polarlichtern, Strommasten, einer Raumsonde, und eines Teils der Sonnenatmosphäre.
Detailliertes Program der Öffentlichen Vortragsreihe am Max-Planck-Institut für Sonnensystemforschung mit sechs Vortragsterminen und einem Link auf das Programm unter https://www.mps.mpg.de/im-feuerwerk-der-sonne
@stf@chaos.social
2025-11-26 17:06:26

by accident i stumbled on this review by the #NSA on Bruce Schneiers "Applied Crypto" book from long ago.

9. BOOK REVIEW: APPLIED CRYPTOGRAPHY [censored] Reviewer

Applied Cryptography, for those who don't read the internet news, is a
book written by Bruce Schneier last year. According to the jacket,
Schneier is a data security expert with a master's degree in computer
science. According to his followers, he is a hero who has finally
brought together the loose threads of cryptography for the general
public to understand. Schneier has gathered academic research, internet
gossip, and everything he co…
Issue 1 TALES OF THE KRYPT Page 14 of 16
oc ID: 6823780

Playing loose with the facts is a serious problem with Schneier. For
example in discussing a small-exponent attack on RSA, he says "an
attack by Michael Wiener will recover e when e is up to one quarter the
size of n." Actually, Wiener's attack recovers the secret exponent d
when e has less than one quarter as many bits as n, which is a quite
different statement. Or: "The quadratic sieve is the fastest known .
algorithm for factoring numb…