US & China Are Investing Big In Quantum Computing Simulation

Quantum computing is a field of super-computing that utilises quantum-mechanical phenomena such as entanglement and superposition to perform computation. Quantum computers perform calculations based on the probability of an object's state before it is measured, instead of just 1s or 0s, which means they have the potential to process exponentially more data compared to classical computers.

The US Congress has authorised up to $1.2 billion of research funding for quantum information science, including computing. 

Some of the world’s largest technology companies are rapidly building prototype devices, with Google reportedly documenting the first case of a quantum computer that can beat classical computers at a specific task.

China is also developing its own quantum computers. Scientists from Hefei-based University of Science and Technology of China have independently developed the country’s first control system for future quantum computers in 2018. The country is also investing in a $10 billion national laboratory for quantum information science in Hefei, due to open next year.

Quantum simulators permit the study of quantum systems that are difficult to study in the laboratory and impossible to model with a supercomputer.

A group of Chinese scientists developed a method in simulating quantum computing. The team, led by Wu Junjie, a leading expert from the National University of Defense Technology, proposed a method to realise an efficient simulator of quantum algorithms. They applied the method to study random quantum circuits, which can quantify precisely the memory usage and the time requirements of random quantum circuits. 

Wu said quantum computers’ calculation ability has outperformed all supercomputers, and achieving quantum supremacy is a milestone in quantum computing development. 

Assessing this supremacy needs an efficient quantum computing simulator, which will also serve as a significant tool to accelerate scientific research on quantum computing, Liu Yong, a member of the QUANTA team, said, according to ecns.cn.
The method was demonstrated on China’s Tianhe-2 supercomputer, Wu added. 

By Kind Permission of I-HLS

You Might Also Read:

Quantum Computing Is Becoming Reality:

US Builds The Fastest Supercomputer. For Now:

 

« On Trend: Business Data Protection Laws
Using The Right Technology Saves Downtime From Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

Knowit

Knowit

Knowit support customers in the digital transformation, simplify people’s everyday lives and create secure and innovative solutions enabling a sustainable future.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.