Quantum Computing: The US Airforce Needs Help

The US Air Force wants white papers that describe new ways quantum computing could help achieve its mission, according to an amended Broad Agency Announcement. Eventually, the government could provide a test-bed where a contractor might install, develop and test a quantum computing system.

Last year, the Air Force announced it had about $40 million available to fund research into, and the eventual maintenance and installation of a quantum system -- a branch of emerging computing technology that relies on the mechanics of atomic particles to process complex equations. 

The Air Force Research Laboratory's Information Directorate, which focuses on processes such as signal processing, networking technology, cyber research and supercomputing, is collecting those white papers. 

Many problems that stump traditional computers can be re-framed as "optimization problems," the solicitation says; one of quantum computing's potential benefits is its ability to quickly find the optimum solution to a multidimensional problem, given certain constraints. 

The Air Force is among several other federal groups interested in quantum.

Last year, for instance, the Intelligence Advanced Research Projects Activity, which focuses on research and development, said it planned to award a multiyear grant to IBM to build out a component of a quantum computer. A true quantum computer might be useful, IARPA program manager David Moehring told Nextgov then, because it might be applied to complex questions like the "Traveling Salesman Problem" -- what's the best way for a salesman to visit several different locations?

A quantum system might be able to help other parts of the Defense Department, including in projects involving machine learning, pattern recognition, and logistics, the Air Force posting said. The Air Force also wants to build out a network of users who might think of new ways to apply quantum computing to their own agencies. 

Ultimately, the Air Force wants to figure out how to most effectively use quantum computing power when attacking a specific question, the solicitation said. For instance, a scientist might use different strategies if he or she wants a computing system to spit out an answer more quickly, or if he or she would rather have a more precise answer. Parameters "should be tailored" to match the specific problem, according to the Air Force. 

To get funding in the 2017 fiscal year, the solicitation recommended submitting white papers by Sep. 30. 

NextGov

« Cyber Attacks On Banks Prompt New Regulatory Safeguards
Don’t Underestimate Virtual Reality »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ANS Group

ANS Group

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.