Feeds

Secret of invisibility unravelled by US researchers

Finally, the formula for invisibility is ours. Mwahahaha...

Bridging the IT gap between rising business demands and ageing tools

Scientists at the University of California in Berkeley have engineered a material that can bend visible light around objects. This development could soon result in technology that can render tanks, ships and troops invisible to the eye.

Results of the US military-funded research are expected to appear in the scientific journals Science and Nature this week.

According to a report in the Sunday Times, this breakthrough follows earlier work undertaken at the Imperial College in London that achieved similar results with microwaves. Like light, these are a form of electromagnetic radiation, but their longer wave-length makes them far easier to manipulate. Achieving the same effect with visible light is a big advance.

Journalist's impression of troops equipped with the new cloaking technology on exercise

The head of research, Professor Xiang Zhang, said in the case of invisibility cloaks or shields, the material would need to curve light waves completely around the object like a river flowing around a rock.

In essence, an observer looking at the cloaked object would then see light from behind it, making it seem to disappear.

Substances capable of achieving such feats are known as metamaterials, which get their electromagnetic properties from their structural mix, rather than directly inheriting those of the substances composing them.

They have the power to grab electromagnetic radiation and deflect it smoothly. No such material occurs naturally and it's only very recently that molecular engineering has advanced sufficiently to give scientists the opportunity to create them.

Not since Project Rainbow, when in October 1943 the US Navy rendered the destroyer escort USS Eldridge invisible to human observers for a brief period, has such a breakthrough in light-refraction stealth technology been made.

Of course, that last bit's complete nonsense. ®

Mobile application security vulnerability report

More from The Register

next story
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.