Amazon Launches A Quantum Semiconductor Chip

Amazon Web Services (AWS) has announced a potential breakthrough in quantum computing, a massive processing power technology, with the release of a prototype chip built on "cat qubit" technology, that takes the name from the famous "Schrödinger's cat" thought experiment.

Named Ocelot, the chip aims to deal with one of the major problems for quantum computer development -  to make them error free.

Now, Amazon researchers have published their findings in a research paper in the scientific journal Nature. 

While quantum computers are likely to be with us sooner than previously thought, but the questions about how powerful these machines will be is still being discussed. Quantum computers won't replace so-called "classical" computers, but promise to be able to solve problems even the most powerful modern computers cannot, yielding new discoveries such as better batteries and new medicines. But that potential is being held up by the problem of errors.

The algorithms required for quantum error correction have heavy-duty  hardware requirements. Furthermore,  Quantum computers are extremely sensitive to noise in their environment, vibrations, heat, electro-magnetic interference from mobile phones and WIFI networks, or even cosmic rays and radiation from outer space can all cause them to make errors, which then need to be corrected.

Cat qubits are one attempt at solving this problem by engineering error resistance into the design of the qubits it uses.

Qubits are the fundamental elements of quantum computers, the equivalent of bits in the computers most of us use today. Amazon believes the new chip offers a path to scaling up to more powerful machines with this type of error proofing built in, but researchers admit there are many challenges ahead.

Amazon's Ocelot chip is still a prototype, but the chip’s more efficient architecture could potentially allow for smaller quantum computers that use less resources.

Nature   |   Amazon   |    BBC   |    Reuters   |    MIT   |   The Verge  

Image: jiefeng jiang

You Might Also Read: 

Modular Design: IBM's Big Quantum Computer:
 


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Guidance Is Coming, But Hackers Aren’t Waiting
Patented Technology For Secure Banking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Astra Security

Astra Security

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Caulis

Caulis

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.