Categories
Press review Tech Magazine

Brief Intro to Quantum Computing

The advent of quantum computing marks a pivotal moment in the ever-evolving landscape of technology. From the inception of ENIAC nearly 80 years ago to the present day, the pursuit of computational power has driven innovation, leading us to the frontier of quantum mechanics. With traditional computing reaching its limits, the emergence of quantum computing offers unprecedented possibilities, revolutionizing how we process information and tackle complex problems.


Need advice on how to start or develop your freelance consulting business in tech or IT? Need to start a new permanent or freelance assignment? Join Mindquest and get support from our team of experts.


Quantum computers, how they were created  

Computer manufacturers have been pushing the frontiers of engineering since then. To achieve exponentially more powerful computing while reducing hardware size. Intel co-founder Gordon Moore famously predicted that the continuous shrinking of transistors would allow computer chips to double their processing power every two years. The forecast became known as Moore’s Law, and it has guided the semiconductor industry for over half a century. But things are changing.

It turns out you can only squeeze so much out of a single technological development. With time, chip components have become so small that their innovation and manufacturing are becoming prohibitively costly and slow. Just the research needed to stick to Moore’s Law costs silicon chip producers 18 times more than it did in 1971;  according to economists at Stanford and MIT.    

As a result, we must put the focus on developing a technological successor that allows us to keep up with our current pace of progress – enter quantum computing.       

Quantum vs traditional computers  

Traditional computing is based on the accumulated interactions of basic units of information: bits. These can hold two possible values, either 1 or 0 – hence the binary denomination.   

However, quantum computers operate by leveraging quantum mechanics and information theory (i.e. the properties of atoms, of matter itself). The basic unit of information in quantum information theory is called a qubit. It can hold the value of 1 and 0, but also of everything in between – all at the same time. This property called quantum superposition describes the uncertainty of a particle’s state until this is measured. And also it is best explained by using the example of Schrodinger’s cat.   

Schrodinger theory application

In this classic problem of logic, Schrodinger puts a cat in a closed box with a deadly poison. While the box remains closed, it is impossible to tell if the cat has taken the poison and is therefore dead, or if the poison lays untouched and the cat is still alive. The cat being dead or alive represents the 1 or 0 in a qubit. But here it’s where it gets tricky.   

Since we can’t really say whether the cat is still alive or dead; quantum mechanics tells us that the cat is both alive (1) and dead (0). And everything in between at the same time. That is, of course, until we open the box and see what happened. In this example, opening the box would be equivalent to measuring the state or value of a qubit.  

Down to the practical level; and beyond giving some of us a mild headache; what all of this essentially means is that quantum computers can perform some calculations incredibly faster than traditional ones. And that is because they offer a completely different approach to mathematical problems.   

Let’s say we find ourselves in the middle of a labyrinth… And need to find the way out as quickly as possible. Whereas a traditional computer would try the various possible routes one at a time, a quantum computer can try all the paths at once. This allows these machines to be way better than traditional computers at solving certain types of problems. Like factoring large numbers or cracking a code.   

Quantum supremacy

The triumph of quantum computers over traditional ones is what is known as quantum supremacy. Such a milestone will be reached when a quantum computer can beat the most advanced supercomputer at the planet at a particular task or benchmark test.   

Google claimed to have achieved quantum supremacy last year. Although many have cast  a shadow of doubt over that claim, it gives us a good idea of what this technology can achieve. But also what this technology will achieve soon enough. The company’s quantum computer allegedly took 200 seconds to perform a task that would take IBM’s Summit (the world’s fastest supercomputer) 10,000 years to complete.  

Quantum Computing and Cybersecurity

In the realm of cybersecurity, quantum computing presents both opportunities and challenges. On one hand, the immense computational power of quantum systems has the potential to revolutionize encryption algorithms. Rendering current cryptographic methods obsolete. Quantum-resistant cryptography, such as lattice-based cryptography and quantum key distribution, offers promising solutions to mitigate the threat posed by quantum computers to conventional encryption methods.

However, the same quantum capabilities that enable advancements in cryptography also pose a threat to cybersecurity infrastructure. Quantum computers could theoretically break widely used encryption protocols, jeopardizing the confidentiality and integrity of sensitive data. As quantum computing continues to advance, it becomes imperative for cybersecurity professionals to adapt and develop quantum-safe cryptographic techniques. This to safeguard digital assets in the quantum era.

What lies ahead for quantum computing  

So, when will I be able to buy a quantum computer? Well, it is highly unlikely that you’ll be carrying around a quantum laptop in the year 2050 – or any time after that for that fact. And that’s not only because of technical limitations (which of course are plenty), but also because you will not need to.   

On the hardware side of things, the biggest limiting factor is the high instability of quantum states. Maintain qubits stable and superposed requires cooling them at temperatures near absolute zero. In plain language: to have a controllable and accurate quantum computer, you need, as of today, a huge refrigerating apparatus.  

As for their potential applications — quantum computers cannot only be extremely advantageous in certain fields and problems of today; they also open the doors to a new realm of capabilities that we are not even able to imagine at this point. However, all these applications will probably have nothing to do with the everyday tasks reserved for personal computers and smartphones.   

The true power of quantum computing, at least in theory, resides in their power to make endless calculations possible in a reasonable amount of time. There are already many algorithms designed to exploit these capabilities, promising great leaps forward in areas like data analysis, cryptography and artificial intelligence. Additionally, there are other quantum properties, like entanglement, which we are barely starting to study – we will be discussing them in a future article.   

Only time will tell which paths are viable. The clock is ticking, and it’s a quantum one.  

Join our talent community - Mindquest

Also discover our articles: 4 Things Sci-Fi Might Still Get Right by 2029 and The Advantages of Working On-Site in Times of COVID-19

Categories
Press review Tech Magazine

Weekly News Digest #11

Companies, individuals and institutions around the globe are coming together to provide solutions for the crisis — from 3D-printed medical devices like ventilators and protection goggles, to supercomputers and cloud consortiums put at the disposal of researchers and doctors. 

It sounds like a cliché, but dark times really seem to bring out the best in people. It’s inspiring to see everyone pitching in. 

But social distancing and the move of almost all activities to the digital realm are putting our infrastructures under test. 

Concerns regarding network congestion and the Internet’s capacity to handle the increase in traffic are going global

Popular streaming services like Netflix have had to downgrade the video quality of their content in response to the soaring numbers of people turning to digital entertainment for some solace.

At the same time, enterprise cloud services like AWS and Microsoft Teams are experiencing lag and connectivity issues due the amount of businesses moving online to remain operational. So far, the system is holding up — Let’s keep it that way, please!

Categories
Press review Tech Magazine

Weekly News Digest #10

You can bet Alan Turing didn’t see this one coming when he cracked the Enigma machine. 

Pixar pioneers Edwin Catmull and Patrick Hanrahan have won this week the prestigious Turing Award, the highest distinction in computer science. 

The two men invented many of the 3D computer graphics techniques used to make animation films and special effects. If you liked the following movies, you now know who to thank: 

  • Toy Story
  • The Lord of the Rings
  • Finding Nemo
  • Titanic
  • Avatar
  • Jurassic Park

Speaking of working from home…

Many organisations including the World Economic Forum have stressed the importance of ensuring enterprise networks remain safe as more and more people shift to telework. 

Keeping cybersecurity in mind shouldn’t be a problem for IT professionals like you, but it’s always a good idea to make sure everyone is on the same page regarding the proper use of company resources and tools.  

A quick reminder can save you a great deal of pain. Here are some tips.

Finally, one for developers —

Microsoft has released this week the first developer preview of .NET 5. The new iteration, set for release this November, brings unified development across desktop and mobile thanks to its integration of mobile-app building platform Xamarin. 

The first preview includes support for Windows Arm64 and the .NET Core runtime, whereas the second one will include SDK and ASP .NET Core.

We recommend you look into it. 

Categories
Press review Tech Magazine

Weekly News Digest #9

In the wake of International Women’s Day, the creator of the world wide web, Tim Berners-Lee, has issued a warning in an open letter marking the web’s 31st birthday.

“The world has made important progress on gender equality thanks to the unceasing drive of committed champions everywhere. But I am seriously concerned that online harms facing women and girls – especially those of colour, from LGBTQ+ communities and other marginalised groups – threaten that progress.”

Berners-Lee makes this warning just a year after launching the Contract for the Web, an action plan to prevent the world from turning into a “digital dystopia.” 

Remember when Amazon started testing its cashierless technology in Seattle?

If you don’t, don’t worry. It’s easy to get the gist —  You walk into the store, grab whatever you need, put it in the bag and simply walk out. The tech takes care of all the rest. 

While we all thought the move spelt doom for other retailers, as of this week, the company is selling the solution to competitors. 

Interesting strategy for market penetration. 

Finally, the UK will be rolling out in April a new digital services tax aimed at US tech giants.

The measure will impose a 2% levy on British revenues of search engines, social media services and online marketplaces. It is expected to raise up to £280m in its first year.

With this tax, the UK follows the lead of France, which implemented similar measures last year. 

Categories
Press review Tech Magazine

Weekly News Digest #8

You heard it right, Timmy. No more “abc123.”

Scary news this week – and not only regarding COVID-19.

On Wednesday, the National Cyber Security Centre (NCSC) — the UK’s cyber-defence organ – warned the public about the ease with which baby monitors and other smart devices can be (and have been) hacked. 

The usual culprit? Weak default passwords.

In one of the creepiest reported episodes, the attacker spoke to a young girl in Tennessee pretending to be ‘Father Christmas.’

Terrifying. And a good reminder for security experts to take the dangers of human oversight seriously, both at home and at work. 

Meanwhile, tech conferences all over the world are being cancelled or going virtual over global infection fears. Oh, dear. This is shaping up to be another one of those coronavirus specials… 

Facebook’s F8, Microsoft’s MVP Global Summit and Google I/O are among the affected events. 

The latter two companies also announced that they’ll be making their professional conferencing tools available for free as a growing number of firms are encouraging their employees to work remotely.

You know what they say — If life gives you lemons, start promoting your products.

Still haven’t had enough coronavirus? Check out this story on how AI and robotics are helping fight the virus. 

Faith in humanity (and robots) restored ?

And, speaking of robots… 

Researchers at Google have created a robot that taught itself how to walk using reinforcement-learning algorithms.

It took the robot just a few hours to do what we humans need an average of a year to learn. A promising milestone for artificial intelligence. 

So cute. 

Categories
Press review Tech Magazine

Weekly News Digest #7

Into mystery movies? Beware of spoilers.

Opening scenes of a crime thriller.

The protagonist, a beat detective with a good amount of personal problems, examines the room where the murder took place. One by one, the film introduces the various characters in the story, and the question inevitably pops up into your head:

Who’s done it?

Well… Knives Out and Star Wars director Rian Johnson might have ruined the fun for all of us. According to the filmmaker, Apple doesn’t let bad guys use an iPhone on screen for branding purposes.

There you go. Now you can start ruling suspects out.

A week in retrospect

Speaking of crime…

A new study on cloud security published this week revealed that only 57% of all business-sensitive data stored in the cloud is protected by encryption. This is particularly worrisome considering that 47% of businesses report having suffered a breach or failed a security test in the past year.

Is your data at risk? This article might help you figure it out.

Stop pointing that at me.

The debate around the use of facial recognition to fight crime is heating up. In response to mounting criticism, London’s Metropolitan Police Commissioner Cressida Dick tried to calm down the public by highlighting the benefits of the technology.

There seems to be a general misunderstanding, as the system currently being employed in the UK doesn’t store the data it captures. It simply compares faces against a data base of known offenders, in real time.

The images we post on Facebook and Instagram do much more to endanger our biometric privacy, assures the Met’s chief.

Meanwhile, a global report from communications firm Edelman revealed that 60% of people feels tech is advancing too fast…

And, speaking of advances…

The MIT Technology Review has published its annual list of technological innovations poised to have a big impact on solving the world’s problems. Here are the contenders:

  • Unhackable internet
  • Hyper-personalized medicine
  • Digital money
  • Anti-aging drugs
  • AI-discovered molecules
  • Satellite mega-constellations
  • Quantum supremacy
  • Tiny AI
  • Differential privacy
  • Climate change attribution

Would you add or change anything?

Categories
Cybersecurity Tech Magazine

Data security : Is your cloud data secure?

Digital transformation is well underway. An estimated 50% of all business data is already stored in the cloud; while 48% of this data can be considered sensitive in nature. These figures, which were reported on Monday in a global study by Thales and IDC, paint a promising future for the enterprise cloud industry. They also seem to signal growing confidence in the technology’s security and privacy capabilities. So, regarding data security, is your cloud data secure?

Data security: number and perception

The same survey revealed that only 57% of all cloud-stored sensitive data is protected by encryption, whereas 100% of respondents admit to having at least some unencrypted sensitive data in the cloud. One could think this constitutes further proof of the enterprise’s sense of data security. In reality, the number of respondents that feel their data is vulnerable to cyberthreats (86%) has increased considerably since last year’s report (67%). Furthermore, 47% of businesses report having been breached or failed a security test in the past year.  

There is thus a clear disconnect between the perceived levels of data security and the actual measures being put in place. Many decision-makers are not paying enough attention to their own danger alerts, and that is dangerous.

So — how can you tell if this happening in your organization? There are a few telltale signs.

Choosing the right multi-cloud partners

Achieving optimum levels of data protection is becoming increasingly difficult as more and more companies turn to different cloud providers to meet their various business needs. The vast majority of businesses (81%) report using more than one infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) vendor. Meanwhile, 72% of organisations state they use between 11 and 100 software-as-a-service (SaaS) applications — That’s a lot of potentially breachable data living in the cloud.

Data security: how to implement a proper strategy

These multi-cloud environments add a layer of complexity on top of the already complicated world of cybersecurity. In turn, survey respondents identify complexity as the top barrier to implementing a proper data security strategy.

To protect data integrity, organisations must leverage the appropriate set of tools across platforms and partner with those vendors offering solutions that fit within their ecosystem. Ideally, your various security tools and protocols should cover both on-premises and cloud-based data and be compatible with one another.  

If that’s not the case, it might be time to review your security architecture. Putting together the right team has also become essential for multi-cloud success. Consider hiring a cloud security specialist if you haven’t done so yet.

Data vs network security

Despite 83% of organisations planning to either maintain or increase their security spending in 2020, the portion of the security budget destined to data security remains marginal at 15.5%. Comparatively, companies spend much more on network security. This seems to be due to another important disconnect — that between the major perceived security threats and the reality behind most data breaches.  

While more than half of businesses are worried about cybercriminals, terrorists and corporate espionage; everyday issues that tend to pose greater challenges to data integrity are often less cause for concern. Just in the UK alone, 90% of data breaches experienced in 2019 originated from a human error. Employee communications, system misconfigurations and privileged users with access to sensitive resources are all potential risks that network security cannot mitigate.

Data security: accesses and permissions

A great focus on data security is, therefore, highly recommended. Re-examine and restrict your access protocols and permissions, encrypt greater amounts of data and make sure to store and safeguard the keys properly. Moreover, invest in data recovery and backup tools.

Also, do not rely too much on your providers to protect your data. Sure, the cloud is fundamentally a shared responsibility environment. However, there are many proactive measures that you can implement internally to safeguard this data.

Remember – if there is a breach, it will be the company’s reputation the one to take the biggest hit, not the provider’s.   

The threat of emerging tech

Although most experts do not see widespread quantum computing entering the scene until 15 or 20 years from now. The security risks this emerging technology represents are already in the minds of business leaders. Around 72%% of companies believe quantum computers will start disrupting their encryption efforts within 5 years.

Quantum computations can potentially decipher most cryptographic key systems used today. However, the technology is still in its infancy, and companies shouldn’t worry too much about its security implications just yet. But, if you’d like to start future-proofing your system, there are several vendors out there already working with quantum cryptography methods.

Categories
Press review Tech Magazine

Weekly News Digest #6

Join us as we bid farewell to one of the fathers of UI. Larry Tesler, the innovator behind “cut”, “copy” and “paste” passed away earlier this week. He was instrumental in making computers accessible to the general public, and we owe him much for that.

Tesler’s CV included Stanford, Xerox and Apple. His chief invention, cut and paste, is said to be based on the old editing technique of cutting portions of text and gluing them elsewhere. The feature debuted in Apple’s 1983 Lisa computer.

A week in retrospect…

Let’s start with AI.

Researchers from the ESPCI Paris and the Max Planck Institute for Evolutionary Biology recently published a study which might explain why single-celled organism like viruses are so successful. The research shows that, under the right ecological conditions, groups of these organisms start behaving like a single one.

The computational models used to recreate said conditions can have a tremendous impact on AI research. By emulating the natural selection process, we could build rich neural networks that one day could rival even that of the human brain.

The Internet of (Wild) Things.

Both climate change and IoT are in everyone’s mouths these days. Not often in the same sentence, though.

We can’t recommend enough Charles McLellan’s piece on how IoT is helping organisations fight biodiversity loss and climate change. From camera-based anti-poaching systems, to listening networks that monitor for the sound of chainsaws, NGOs and charities are doing impressive things all over the world.

A truly refreshing perspective on the applications of emerging tech.

In mergers and acquisitions…

Google has acquired the Dutch company Cornerstone, which specializes in helping companies transition from on-premises to the public cloud. The move signals the push of big tech companies to deliver all-in-one cloud solutions and achieve market dominance.

Meanwhile, Dell is selling the cybersecurity leader RSA to a consortium of equity firms. The company said in a statement that the $2-billion deal will help simplify its business and product portfolio.

Categories
Press review Tech Magazine

Weekly News Digest #5

A week in retrospect…

The global association of mobile operators (GSMA) announced on Wednesday that it is cancelling this year’s edition of the Mobile World Congress (MWC), the world’s largest mobile trade show. The decision was taken after several industry giants like Amazon, Ericsson and Deutsche Telekom pulled out for fear of the newly baptised COVID-19 virus.

The announcement comes as a huge financial blow for the city of Barcelona and for many smaller consumer electronics companies that rely on the show to debut their new devices and make most of the year’s deals.

Interestingly, it’s business as usual for other global trade shows of similar scale being held right now, like Amsterdam’s ISE. Multiple companies that cancelled their attendance to MWC are currently exhibiting their products and solutions at ISE, suggesting fear of the virus is not the only factor at play here.

Good and bad news fo ther UK’s tech sector. First the bad ones.

We learned this week that British tech firms ended 2019 with the worst quarterly results since 2012. The bump in the road seems to have been motivated by the political uncertainty surrounding the country’s geopolitcal future.

Don’t panic, though. The UK’s tech industry is doing great. In fact, it registered the tech world’s biggest salary raises in 2019. Even ahead of San Francisco and New York.

Meantime, in Switzerland…

What’s the easiest way to crack a country’s encrypted communications? Well, of course — to secretly buy the company selling them encryption services in the first place.

At least that’s what the CIA and the West German government did with the Swiss company Crypto AG. In what the CIA itself describes as “the intelligence coup of the century,” the U.S. intercepted other countries’ communications for decades.

The whole thing started with mechanical encryption devices and ended in 2018, when ubiquitous cyber-encryption services brought the Swiss firm to bankruptcy.

Lastly, if you’re working on apps for Windows, here’s a friendly reminder that Microsoft released this week a new dev toolkit for its dual-screen OS, Windows 10X.

Dual and foldable screens are the latest fad. Will they last?

Categories
Press review Tech Magazine

Weekly News Digest #4

Good morning! So… Thursday. Quite the week, right?

The UK is officially no longer part of the EU. The Wuhan coronavirus is spreading almost as quickly as the xenophobia it has sparked. Oh, and Trump finally managed to turn the State of the Union address into a full-blown reality TV show.

We have prepared a whole new batch of resources and interesting reads for you to explore this week. But, first things first. Let’s see what the tech world has been up to.

A week in retrospect…

In case the Iowa caucuses weren’t complicated enough, the app designed to collect and share the vote results for the US Democratic Party went absolutely bonkers. It wasn’t hackers, though.

Apparently, someone was so excited to implement new voting technologies that they went ahead with an untested app developed by the aptly named company Shadow. No training for volunteers either. Because, you know — why. They spent the rest of the week manually counting the results. Oh, blessed be paper backup.

Meanwhile, somewhere over the rainbow…

The Cloud Wars wrapped up this fiscal year’s offensive as the big players announced Q4 earnings.

AWS retains its leadership, with Microsoft on second place and narrowing the gap. In third place, Google Cloud, which released its first official cloud earnings report earlier this week.

The FY2019 revenue table for the top 3 cloud divisions stands as follows:

  1. Amazon — $35 billion (37% more than in 2018)
  2. Microsoft — $16.4 billion (39% yearly increase)
  3. Google — $8.9 billion (53% spike from last year)

Also —IBM recently changed CEOs, promoting its head of cloud to the top position in an effort to catch up with the competition.

Let the 2020 race begin.

Big news for the SAP community this week — The company is extending free ECC support throughout 2027, with optional maintenance until 2030.

Looks like SAP has finally accepted an extension as inevitable if it wants more of its customers to migrate to S/4HANA. The ERP vendor has vowed to support the new iteration until 2040.

Finally, human trials of the first AI-designed drug will soon start in Japan.

Targeted at patients suffering from obsessive-compulsive disorder (OCD), the new compound represents a major technological and medical achievement. While the average drug development takes about 5 years to get to trials, AI did it in just 12 months.

Let’s hope it actually works. That would mean better, faster, and cheaper medicine for all.