China Plans For Supremacy In AI & Quantum Computing

The Chinese government plans some significant breakthroughs in quantum technologies, which would make China a leading quantum superpower. The country is entering a race with the US in advanced technologies from semiconductor chips to Artificial Intelligence (AI) and Quantum Computing over the next five years. China is already actively involved in quantum communications and the country's efforts are set to increase further with its latest 5 year economic planning cycle, where it   intends to create a long-distance and high-speed quantum communication system that is compatible with classical communication technology.  

China has been a long-running rival and partner of the United States in producing massive technologies from various companies like Apple, Intel, Microsoft, and Amazon. Indeed, many of the components that are used to make these companies' products are made in Chinese factories, which offer lower production costs compared to the US and EU.

The Chinese government is also setting high expectations in the field of quantum computing, with plans to achieve the coherent manipulation of more than a few hundred qubits before the end of the 14th five-year plan, while also developing quantum simulators that can perform beyond classical computers in solving a number of problems. However, the tension between the two countries has tightened in the past years, as the United States has enforced a Trade Ban on several Chinese companies, including Huawei.

This issue was repeatedly denied by Huawei but has been banned from using components and tech from Google and Qualcomm, which it heavily relies upon. 

Economists and industry analysts say the latest five-year plan stands out for its emphasis on advanced technologies and innovation. It also includes China’s vision for 2035, when the country expects to have “significant breakthroughs on core technologies and seeks to be among the most innovative nations globally.” China is known to have been working on a hack-proof quantum computer that could send messages like electronic mail and video calls using next-generation technology. The tech heavily relies on satellites to boost its power and quantum computing which has been the focus of most researchers to develop. 

Artificial Intelligence is also a significant thing in China, as it aims to assign the telecoms company ZTE the status of national champion in creating the country's native AI that could power most of its technology and end its reliance on the United States. Huawei would also join the five-year plan's timeline, helping the country develop and advance in various technologies such as smartphones and computers.

China is developing a collection of impressive innovations in the past years, and it includes robotics, artificial intelligence, and 5G networks. The move by the country is to move away from its heavy reliance on partner countries such as the US and to become self-sufficient across a range of new technologies, including electric vehicles, AI, and the smartphone technology which Huawei has initially dominated.

These technologies are critical and likely to emerge as dominant over the next decade and China is aiming its sights on developing in this aspect to establish its supremacy. 

XinHuaNet:      TechTimes:      WSJ:      ZDNet:     Endgadget:     Yahoo:    Image: Unsplash

You Might Also Read: 

Has China Become The Greatest Cyber Power?:

 

« Secure Your Personal Email & Social Media Accounts
Trump is Planning A Social Media Return »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

Procsima Group

Procsima Group

Procsima Group was created to help you achieve good IT management and security excellence.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.