British Defence Ministry Gets A Quantum Computer

The UK Ministry of Defence (MoD) has acquired the government's first quantum computer and will work with Orca Computer, a spin-out from Oxford University to enable the ministry to develop quantum applications for military use. 

Quantum computers can make very complex calculations quickly and they can solve problems regular computers cannot and Orca Computing aims to provide a new approach to quantum computing using proprietary quantum memory technology and leveraging an industry-standard infrastructure.

Orca uses its own patented quantum memory to store and retrieve single photons on demand. It enables high-speed ‘repeat-until-successful or release-when-needed’ operations. This helps to overcome the reliance on having an extremely large number of redundant components working in parallel.

Quantum computing experts and physicists say this means that the problems combed over by average computers for years could be solved in a matter of minutes. Most computers process data in bits, which have a binary value of either zero or one, whereas quantum computers use a two-state unit for data processing called a qubit.

A quantum system could also analyse images and other data gathered from the battlefield, as well as being asked to assess the enemy's next move and potentially advise on a best response. Stephen Till, of the MoD's Defence Science and Technology Laboratory (DSTL), called it a "milestone moment".

Quantum computing has been on the rise over the past few years, with experts suggesting that the technology could provide up to £4bn of economic opportunities globally by 2024 alone, while productivity gains could surpass over £341bn within the next few decades. 

This can represent digits like one or zero simultaneously through a quantum mechanical process called superposition, letting quantum computers bridge binary digits and cope with uncertainty where regular computers cannot.

Prof Winfried Hensinger, head of the Sussex Centre for Quantum Technologies at University of Sussex, says the true potential of quantum computers will take time to fully materialise. "They can't actually solve any practical problems yet. They're enabling you to maybe gauge the possibilities of what working on a quantum computer would have if you can scale this machine to really large system sizes." But he adds the promise of quantum computing, and the MoD's exploration of it, is still significant. "Quantum computing can be disruptive in nearly any industry sector," Prof Hensinger adds.

Britain wants to be the world’s first quantum-ready economy. As part of this, the UK pledged £10m of funding back in 2020 to build the country’s first quantum computer. In 1997, the first tiny quantum computer was built, but the field really took off only when the Canadian startup D-Wave revealed its 28-qubit quantum computer in 2007.

E&T:      Metro:    BBC:       Daily Mail:    Information Age:      Oxford Mail:   WEF:   Scientific Computing

You Might Also Read: 

NATO Tests A Post-Quantum VPN:

 

« Channel Islands Used To Launch Global Cyber-Attacks
Elon Musk, YouTube & Bitcoin »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

European Digital Media Association (EDiMA)

European Digital Media Association (EDiMA)

EDiMA, is the European trade association representing online platforms. It is an alliance of new media and Internet companies.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Inveteck Global

Inveteck Global

Inveteck Global is a Ghana-based cyber security firm providing strategic guidance and technical solutions to all our clients to best serve their individual needs.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.