Fuzzballs, Firewalls and all that ..
نویسنده
چکیده
Black holes are probably the most fascinating objects in the Universe. They result from the attractive nature of gravity, which pulls any object towards any other object. A large ball of matter thus tends to compress under its own gravitational attraction. Remarkably, if this ball is large enough, the other fundamental forces – electromagnetic, weak and strong – are unable to resist the compression, and we get a runaway collapse. As the ball shrinks to smaller sizes, the pull of gravity becomes stronger and stronger, till the entire ball ends up in a point. Imagine the mass of the sun, compressed to a dot! But even more fascinating has been the story of how black holes relate to the ideas of quantum theory. Gravity, quantum mechanics, thermodynamics and information theory all come together in resolving a profound puzzle, found by Stephen Hawking in 1975 [1].
منابع مشابه
Fuzzballs with internal excitations
We construct general 2-charge D1-D5 horizon-free non-singular solutions of IIB supergravity on T 4 and K3 describing fuzzballs with excitations in the internal manifold; these excitations are characterized by arbitrary curves. The solutions are obtained via dualities from F1-P solutions of heterotic and type IIB on T 4 for the K3 and T 4 cases, respectively. We compute the holographic data enco...
متن کاملFulp . Effects of Processing Delay on Function - Parallel Firewalls
Comprehensive security policies are an integral part of creating a secure network and commonly firewalls are used to accomplish this. Firewalls inspect and filter traffic arriving or departing a network by comparing packets to a set of rules and performing the matching rule action, which is accept or deny. Unfortunately, traffic inspection of this type can impose significant delays on traffic d...
متن کاملFirewalls - Are they enough protection for current networks?
Firewalls are widely deployed in most organizations connected to the Internet to implement their information security policy and to protect information from unauthorized access. Yet intruders still manage to attack systems and gain unauthorized access to information that is supposedly protected by these firewalls. This article examines some of the history and background of firewalls and what ha...
متن کاملA History and Survey of Network Firewalls
Firewalls are network devices which enforce an organization’s security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, and network, and data-link levels. In addition, researchers have developed some newer methods, ...
متن کاملFirewall Configuration Errors Revisited
Practically every corporation that is connected to the Internet uses firewalls as the first line of its cyber-defense. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general tha...
متن کامل