Modular Design: IBM's Big Quantum Computer

IBM wants to build the largest quantum computer by linking together smaller machines to create one with a recording-breaking number of quantum bits, or qubits. 

The firm’s first steps on this path in 2025 should see it hit a new qubit record. Eventually, IBM plans to more than triple the size of the largest existing quantum computer.

To achieve this, IBM is adopting a modular design strategy. By connecting several smaller quantum processors, the company plans to create a more powerful, 'parallelised' machine.

While IBM no longer holds the record for the most qubits, a title claimed by start-up Atom Computing with its 1180-qubit device unveiled in 2023, it is determined to reclaim its position as a leader in the field. Jay Gambetta, IBM’s vice president of quantum computing, emphasised the need for new approaches to scaling up. “We know we can’t just make Condor but 10 times bigger,” Gambetta has said. “The only way to get quantum advantage is to combine different components.”

This innovation represents a significant leap forward for IBM, which unveiled its first commercial quantum computer six years ago. That device, which was equipped with 20 qubits, was accessible to researchers via the Internet.

This approach addresses a critical engineering challenge: the difficulty of fitting an increasing number of qubits and their corresponding input and output wires onto a single chip.

As part of its modular strategy, IBM has already prototyped a new chip called Flamingo, which will play a central role in its plans for 2025. The company intends to connect three Flamingo chips into a 1386-qubit system, breaking current size records.

Moving to 2026, IBM aims to introduce another chip, named Kookaburra, as a foundational component for a 4158-qubit quantum computer.

This system, comprising three interconnected Kookaburra chips, would create an unprecedented technological gap between IBM and its competitors in both commercial and academic quantum computing. In November 2023, IBM connected two of its 127 qubit chips to perform a calculation involving 142 qubits, a task that exceeded the capacity of either chip individually.

The success of IBM’s modular quantum computers depends on the development of specialised couplers, components that enable connections between chips and individual qubits at varying distances. IBM has already built and used two types of couplers, but a third, essential for fully modular quantum systems, remains under development.

 The next challenge is scaling up the total number of qubits while minimising the errors that occur when chips are interconnected.

Sri Lanka Guardian     |     New Scientist     |     The Africa Logistics     |     Facebook     |     IBM

Image: Bartlomiej Wroblewski

You Might Also Read: 

Quantum Computing Nears A Turning Point:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Microsoft Will Spend $80b On AI-Enabled Data Centers
The Leading Indian Cyber Security Companies (extract) »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

Secure Enterprise Engineering (SEE)

Secure Enterprise Engineering (SEE)

SEE provides disruptive cybersecurity system engineering, architecture, and operational capabilities to make our customer’s missions execute faster, smarter, and more securely.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.