Spies Want IBM’s Quantum Computer

 

As the physical limits of shrinking the components on computer chips get closer, it’s getting harder to attain more computing power. But quantum computers—which rely on the strange properties of atom-sized logic gates—could have exponentially more power than even today’s most advanced supercomputers. These machines could be used to develop new drugs, crack codes, or potentially even create true artificial intelligence.

IBM has been working on quantum computers for decades, and now it has the support of the US intelligence agencies. On Nov. 8th IBM announced that IARPA, the intelligence community’s research arm, had awarded the company a multi-year grant to continue its research into building quantum computers.

Classical computer, everything from the giant mainframes that used to take up entire rooms, to the smartphone in your pocket, consists of billions of tiny transistors. Those are switches, essentially, that can be turned on or off, represented on computers as 1 or 0. Every, tweet, text, document, and photo is composed of a series of those 1s and 0s, known as bits. In quantum computing, a transistor consists of a single atom, which can exist as a sort of combination, or “superposition,” of 1 and 0 at the same time. These quantum bits, or qubits, in essence allow a computer to perform multiple parts of a calculation at once, making it far more powerful.

But that’s assuming you can get enough qubits working in one place. These qubits are much less stable than traditional bits, and need to be isolated in large machines that can cool them to almost absolute zero. IBM has a few such machines, and the most powerful contains a mere eight qubits.

Right now, IBM is working on correcting errors that are thrown up during its quantum computing tests—due to the fragility of the qubits—and assuming it’s able to wrangle thousands of qubits in one place, all computing as desired, it would potentially have a computer far more powerful than one with a similar number of traditional bits.

One key area where quantum computers could have an impact is encryption and security. Governments could use them to crack even the strongest current forms of digital encryption, or create new forms that are unbreakable. This is likely one reason why IARPA is interested in quantum computing. The agency has been working with other companies, like D-Wave, to develop these machines. (Though some in the field aren’t entirely sure if D-Wave’s computers are really quantum computers, researchers at Google—which bought a D-Wave machine in 2013—have just posted some new findings that they say show “a 100-million-fold speed-up” on a certain, very specific kind of problem.)
 


IBM’s quantum roadmap

IBM outlined its quantum-computing roadmap (above) but told Quartz that it could well be many years, if not decades, before a viable quantum computer is built. But a patient, methodical, and practical approach to research is what has helped the company develop world-changing technologies in the past.
DefenseOne: http://bit.ly/1NmKmEW

« The Biggest Cybersecurity Risk Is Not Identity Theft
Can You Solve The GCHQ Christmas Card Puzzle? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.