Feeds

Prof debuts miniature laser diode for fast networking

And even faster hair removal

Choosing a cloud hosting partner with confidence

Miniature laser diodes emitting intense single wavelength light could speed data networking.

A professor Denis Deppe of the University of Central Florida has invented a new small laser diode that has fewer impurities in it. This brings several benefits.

Firstly, the emitted light has a single wavelength, making its detection easier. Secondly, the light is very intense although it does need a high voltage to create it. Thirdly, the diode itself is stronger than current diodes and more resistant to cracking and failure.

Deppe says these advantages makes it a good fit for laser requirements in CD and DVD players, optical mice, laser pointers – but really, this is not "big" news, and data networking, where it could potentially be huge. He says the small size of his laser diodes, their purity level and cracking resistance means they could be embedded inside optical cables and used for heavy data transmission.

Deppe said: "The new laser diodes represent a sharp departure from past commercial devices in how they are made. The new devices show almost no change in operation under stress conditions that cause commercial devices to rapidly fail... At the speed at which the industry is moving, I wouldn't be surprised if in four to five years, when you go to Best Buy to buy cables for all your electronics, you'll be selecting cables with laser diodes embedded in them."

One problem area is the relatively high voltage needed to make the diodes work, but Deppe seems confident that this problem can be cracked.

The university release says: "Massive amounts of data could be moved across great distances almost instantaneously ... By using the tiny lasers in optical clocks, the precision of GPS and high-speed wireless data communications also would increase."

It goes on to say: "They could be used in lasers in space to remove unwanted hair." Imagine that. Fancy a Brazilian in orbit? ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.