China Plans For Supremacy In AI & Quantum Computing

The Chinese government plans some significant breakthroughs in quantum technologies, which would make China a leading quantum superpower. The country is entering a race with the US in advanced technologies from semiconductor chips to Artificial Intelligence (AI) and Quantum Computing over the next five years. China is already actively involved in quantum communications and the country's efforts are set to increase further with its latest 5 year economic planning cycle, where it   intends to create a long-distance and high-speed quantum communication system that is compatible with classical communication technology.  

China has been a long-running rival and partner of the United States in producing massive technologies from various companies like Apple, Intel, Microsoft, and Amazon. Indeed, many of the components that are used to make these companies' products are made in Chinese factories, which offer lower production costs compared to the US and EU.

The Chinese government is also setting high expectations in the field of quantum computing, with plans to achieve the coherent manipulation of more than a few hundred qubits before the end of the 14th five-year plan, while also developing quantum simulators that can perform beyond classical computers in solving a number of problems. However, the tension between the two countries has tightened in the past years, as the United States has enforced a Trade Ban on several Chinese companies, including Huawei.

This issue was repeatedly denied by Huawei but has been banned from using components and tech from Google and Qualcomm, which it heavily relies upon. 

Economists and industry analysts say the latest five-year plan stands out for its emphasis on advanced technologies and innovation. It also includes China’s vision for 2035, when the country expects to have “significant breakthroughs on core technologies and seeks to be among the most innovative nations globally.” China is known to have been working on a hack-proof quantum computer that could send messages like electronic mail and video calls using next-generation technology. The tech heavily relies on satellites to boost its power and quantum computing which has been the focus of most researchers to develop. 

Artificial Intelligence is also a significant thing in China, as it aims to assign the telecoms company ZTE the status of national champion in creating the country's native AI that could power most of its technology and end its reliance on the United States. Huawei would also join the five-year plan's timeline, helping the country develop and advance in various technologies such as smartphones and computers.

China is developing a collection of impressive innovations in the past years, and it includes robotics, artificial intelligence, and 5G networks. The move by the country is to move away from its heavy reliance on partner countries such as the US and to become self-sufficient across a range of new technologies, including electric vehicles, AI, and the smartphone technology which Huawei has initially dominated.

These technologies are critical and likely to emerge as dominant over the next decade and China is aiming its sights on developing in this aspect to establish its supremacy. 

XinHuaNet:      TechTimes:      WSJ:      ZDNet:     Endgadget:     Yahoo:    Image: Unsplash

You Might Also Read: 

Has China Become The Greatest Cyber Power?:

 

« Secure Your Personal Email & Social Media Accounts
Trump is Planning A Social Media Return »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.