Quantum Computing Is Becoming Reality

Quantum computers would theoretically be able to solve certain problems much more quickly than any classical computers 

The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing…Yet…

The second thing to know: Quantum computing is still a nascent technology that probably won’t be ready for prime time for several more years. 

The third thing you should know. The time to start protecting your data’s security from quantum computers is now.


Quantum Computing Explained

The classical computers we’ve used for decades use a sequence of binary bits. Each bit is always in one of two definitive states – 0 or 1 – that act as on and off switches to drive computer functions. In contrast, a quantum computer uses quantum bits, or qubits. Each qubit can represent both a 0 and a 1 simultaneously. 

Consequently, quantum computers can store far more information than classical computers and have the potential to process massive amounts of calculations running in parallel within seconds, far faster than the fastest classical computers.

Quantum-computing terms

Briefly, a few quantum computing terms to know are:

Quantum mechanics, aka quantum physics. A theory in physics that describes nature in terms of atoms and subatomic particles. Quantum computers are based on quantum mechanical phenomena such as superposition and entanglement.
Superposition. A qubit can be more than one thing at a time through a quantum-mechanics principle called superposition.

Superposition gives quantum computers their speed and parallelism, enabling them to work on millions of computations at once, says Matthew Brisse, Vice President of Research for Data Center and Cloud Infrastructure with the Gartner for Technical Professionals service.

Put another way: With a classical computer bit, a cat is either dead or alive. With a quantum-computer qubit, a cat can be both dead and alive, thanks to superposition. (For that analogy, which is often used when people explain quantum computing, we can thank an Austrian physicist who devised the Schrödinger's cat thought experiment in 1935.)

Entanglement is when qubits are linked with other qubits, so that the state of one qubit can depend upon the state of another. With entanglement combined with superposition, quantum computers have the potential to simultaneously process a vast number of possible outcomes.

The bottom line: “With quantum computing, we can do things in massively parallel systems that we couldn’t do before,” says Brisse.

Quantum-Computing Origins

During a 1959 lecture, physicist Richard Feynman, who helped develop the atomic bomb during World War II, raised the possibility of quantum computing. In the early 1980s, the concept of quantum computing started, thanks to the work of Feynman, Paul Benioff and others.

“By the early 1980s, it was clear that in addition to conventional computing, we could do computations using the rule of quantum mechanics,” says Bob Wisnieff, IBM’s CTO of quantum computing. 

“The question was, if you had a computer built on quantum mechanics, what kinds of computations could be done easier and faster? That question kicked off research into quantum computing at IBM.”

Why we’re talking about Quantum Computing now

To be sure, quantum computing is still in its infancy. Only 1 percent of organizations are budgeting for quantum computing projects, according to Brisse. But that’s expected to grow to 20 percent by 2023. So, why is quantum computing blipping on our radar screens now?

“We’re reaching the limits of what a classical computer can do,” says Ashish Nadkarni, Program Vice President of Computing Platforms, Worldwide Infrastructure at IDC. Many (though not all) experts believe that the phenomenon of Moore’s Law is coming to an end or is at least slowing to a crawl. 

At the same time, a growing number of companies, such as Google, have “an insatiable need for compute power,” Nadkarni says. Thus, the growing interest in quantum computing.

Quantum Computing Applications

Currently, quantum computers can only run limited business applications and specific quantum algorithms. Some believe quantum computers will always be specialised vs. general purpose. And most experts in the field say that quantum computers will integrate and work with, rather than replace, classical computers.

Given that, quantum computers are most likely to be used when there’s a huge volume of data to process within seconds.

“Financial-services companies could benefit from quantum computing, especially with services where the volume of data related to trades is high, and they want to simulate outcomes in seconds,” says Nadkarni.

Other likely applications: Drug and biotech research, gene editing and simulation, quantum chemistry, artificial intelligence, traffic pattern analysis, weather forecasting and cryptography.

“Quantum computers will be particularly good at solving big optimisation problems, such as shipping logistics,” says Brisse.  

Quantum Computing and IBM

IBM is among classical computing giants that are pioneering in the nascent field of quantum computing. The company helped create the field of quantum computing, and it’s been an important research area for the company for decades. On May 4, 2016, IBM announced the IBM Quantum Experience (since shortened to IBM Q Experience), the world’s first Quantum Computing as a Service (QCaaS) offering that enables the general public to connect to IBM quantum computers via the cloud. 

The goal: Enable users to run experiments, explore tutorials and simulations, and otherwise get a taste for quantum computing.

Network World

You Might Also Read:

Quantum Computing - What You Should Know:

Power Of Nature To Enhance Internet Security:

« Crypto-Mining Hits 42% Of Organisations Worlwide
Android Abuse: EU Fines Google $5.1 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

Secure Enterprise Engineering (SEE)

Secure Enterprise Engineering (SEE)

SEE provides disruptive cybersecurity system engineering, architecture, and operational capabilities to make our customer’s missions execute faster, smarter, and more securely.