Page 2,013«..1020..2,0122,0132,0142,015..2,0202,030..»

Infosec products of the month: May 2022 – Help Net Security

Heres a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, Fortinet, Hunters, Enpass, iDenfy, Kasten by Veeam, Kingston Digital, Microsoft, N-able, Nasuni, Netenrich, Orca Security, PIXM, Qualys, SafeGuard Cyber, SecureAge, Skybox Security, Sonatype, Trusona, and Uptycs.

Qualys Custom Assessment and Remediation opens the Qualys Platform for security architects allowing the creation of custom scripts in popular scripting languages, user-defined controls and automation, all seamlessly integrated within existing programs to quickly assess, respond and remediate threats across your global hybrid environment.

Microsoft has announced the stand-alone version of Microsoft Defender for Business, which aims to bring enterprise-grade endpoint security to SMBs, including endpoint detection and response capabilities to protect against ransomware and other sophisticated cyberthreats.

Cove Data Protection provides streamlined, cloud-first backup, disaster recovery, and archiving for physical and virtual servers, workstations, and Microsoft 365 data, managed from a single web-based dashboard. It also delivers fully managed cloud storage, with 30 data centers to keep backups stored in region, to respect data sovereignty.

BIO-key announced upgrades to BIO-key MobileAuth, a multi-factor authentication (MFA) mobile app that integrates the power of IBB across multiple authentication modalities, allowing customers to build a more complete MFA strategy. In addition to the newest IBB-powered modalities, MobileAuth supports device-based biometric authentication methods including Apple Face ID, Touch ID, and Android Biometrics, as well as support for push token authentication.

With Enpass Business, all passwords remain within the trusted boundaries of the organizations local IT systems. Enterprises have the option to store data on employee devices, or use their existing cloud storage, enabling them to maintain control over their data without the need to host additional servers.

Data Theorems new supply chain product can automatically categorize assets under known vendors, allow customers to add additional new vendors, curate individual assets under any vendor, and alert on increases in policy violations and high embed rates of third-party vendors within key applications.

Uptycs announced new cloud infrastructure entitlement management (CIEM) capabilities that strengthen its cloud security posture management (CSPM) offering. These new capabilities provide Security and Governance, Risk, and Compliance teams with continuous monitoring of cloud services, identities, and entitlements so they can reduce their cloud risk.

AuditBoard announced a set of new automation capabilities for its CrossComply solution. These features combine automation with scalability to accelerate security compliance programs with automated framework mapping, evidence collection, and continuous monitoring, as well as providing the ability for teams to leverage applications and data sources.

CatchPulse provides always-on, real-time protection to catch threats by simply blocking all unauthorised applications, processes or scripts from executing. It helps organisations stay one step ahead of unknown threats and offers a simple experience for users of all levels, from novice home users to IT professionals.

Nasuni announced Nasuni Ransomware Protection, a new add-on service to the latest release of the Nasuni File Data Platform that offers an in-line ransomware edge detection capabilities for file data. The new service gives businesses confidence that their file data can not only be quickly recovered following an attack, but that they can now detect live attacks and reduce the time and resources needed to uncover the source of the threat.

Autonomous Access uses the power of artificial intelligence (AI) to monitor login requests in real time, blocking malicious attempts and adding authentication steps when it detects anomalous behaviors.

Orca Security announced a cloud security solution to provide context-aware Shift Left Security for cloud infrastructure and applications. Orcas new command-line interface (CLI) called Orca CLI enables developers and DevOps teams to scan locally hosted images and IaC templates, view results directly in developer tools, and surface findings within the Orca platform.

Sonatype announced a capability focused on identifying and remediating InnerSource components that contain vulnerable, malicious, or outdated open source dependencies. With InnerSource Insight, developers can manage their InnerSource components, see what open source packages theyre dependent on, remediate concerns immediately, and identify safe upgrade paths that wont break builds.

iDenfys Business Verification services will offer custom automatizations in one API, helping businesses to screen other companies and detect criminal activity. According to the images, iDenfy distinguishes whether it is a dormitory, a residential house, a commercial premise, or a luxury office. The new Business Verification services even determine the companys office rental price.

Cohesity released Cohesity FortKnox a SaaS data isolation and recovery solution, adding to the companys Data Management as a Service portfolio of offerings that run on AWS. It is designed to provide an additional layer of off-site protection while simplifying operations and lowering costs compared to magnetic-tape and self-managed data vaults.

Deepfence Cloud, built on the ThreatStryker offering from Deepfence, observes runtime indicators of attack (IoA) and indicators of compromise (IoC) and correlates events to tell the story of each attack as it evolves. With Deepfence Cloud, enterprises can easily tap into ThreatStryker to provide targeted security for their applications against known and unknown threats in real time.

Kasten by Veeam announced the new Kasten by Veeam K10 V5.0 Kubernetes data management platform. Purpose-built for Kubernetes, this latest release is focused on delivering a comprehensive risk management strategy, streamlined CI/CD pipelines and new ecosystem advancement details that optimize and de-risk Kubernetes investments.

Leveraging its proprietary network modeling techniques, Skybox will now quantify the business impact of cyber risks into economic impact. This new financial calculation enables customers to identify and prioritize the most critical threats based on the size of financial impact, among other risk analyses.

Trusona announced Trusona Authentication Cloud, a low-code, cloud-based service that enables users to authenticate without a password using smartphones, laptops and desktop computers. It can also serve as a secure, low-cost replacement for SMS OTP (one-time passcode) authentication.

PIXM Mobile is a cloud-based mobile solution developed with Computer Vision (CV) cybersecurity technology to identify phishing attacks on mobile devices and stop them in real-time, as a user clicks on a malicious link. PIXM Mobile stops phishing on any app, including SMS (smishing), social media, and business collaboration apps, as well as email and web-based phishing pages.

Kingston Digital released the newest addition to its encrypted lineup, IronKey Vault Privacy 80 External SSD (VP80ES). Featuring a color touch-screen and FIPS 197 certified with XTS-AES 256-bit encryption, VP80ES is designed to protect data while also being user-friendly. It also safeguards against Brute Force attacks and BadUSB with digitally-signed firmware for users from small-to-medium businesses (SMB) to content creators.

Corelight Investigator brings complete visibility of the network, both on-premise and in the cloud, with evidence that spans months and years, not days and weeks. Customers can leverage machine learning, behavioral analysis, threat intelligence and signatures, mapped to the MITRE ATT&CK framework, to enable broad coverage of network-centric threats.

SafeGuard Cyber announces the addition of email protection for Microsoft 365 to its security suite of protected communication channels. This new release adds a cyber defense layer to the native security provided within Microsoft 365, giving SOC teams the tools to stop difficult to defend social engineering attacks, insider threats, ransomware intrusion, and other advanced threats across the email channel.

With the Netenrich platform, security ops becomes proactive using a predict and prevent approach in anticipating risky behaviors, disrupting threats and insuring business resilience. Organizations improve their overall security posture while focusing on business growth.

Hunters announced new capabilities in the Hunters SOC Platform to enhance and accelerate security operations workflows for data ingestion and normalization, threat detection, investigation and response. The advances free up data engineers, security engineers and analysts in Security Operations Centers (SOC) to focus on higher value work, such as dealing with threats and challenges unique to their organizations.

Fortinet announced FortiNDR, a new network detection and response offering that leverages artificial intelligence and pragmatic analytics to enable faster incident detection and an accelerated threat response. FortiNDR also features native integrations with the Fortinet Security Fabric as well as API integrations with third-party solutions for a coordinated response to discovered threats to minimize their impact.

More:
Infosec products of the month: May 2022 - Help Net Security

Read More..

CSUF Engineering Team Selected for Competition to Build Sustainable Home, Address Issues Facing Orange County Housing | CSUF News – CSUF News

A CSUF student and faculty team has been selected to compete in the inaugural Orange County Sustainability Decathlon. Credit: Orange County Sustainability Decathlon 2023

To help solve Californias housing needs through sustainable development, a Cal State Fullerton student and faculty engineering team has been selected to participate in the first-ever Orange County Sustainability Decathlon.

This new collegiate competition challenges young decathletes to design and build housing prototypes that address Californias most vexing problems, including the need for affordable housing and energy efficient homes.

This competition will provide our students with a unique opportunity to work across majors to solve real-world problems of designing and building a sustainable house, said the teams faculty adviser Phoolendra Mishra, chair and associate professor of civil and environmental engineering.

The inaugural competition takes place in October 2023 in Orange County, with dates and site announced soon. Funded by a $5 million grant from the state of California, 18 teams from across the country and China were selected. Other teams selected are from University of California campuses, state and private institutions, community colleges and a vocational school.

The Titan team will design and build a 1,200-square-foot sustainable house. The design will focus on mindful living that includes the latest technologies to promote interconnectedness with the natural environment and support a holistic lifestyle of its occupants, Mishra relayed.

Our aim is to treat the house as a living being, inspired by Japanese culture, he added. Students will come up with innovative ideas to build a modular home that will be assembled at the competition.

Teams accepted into the competition receive $100,000 in one-time seed money toward building costs. The seed money is not expected to cover all the costs, so fundraising by the teams is required.

The College of Engineering and Computer Science plans to raise additional funds needed to meet project costs, said Dean Susan Barua.

Barua called this competition a bold and complex undertaking for the college and a worthwhile project for students.

Participation in the sustainability decathlon provides an exceptional learning experience for our students, Barua said. Its also a great opportunity for faculty and students to engage in collaborative problem-solving and brainstorm solutions to address environmental and economic challenges that California, the U.S. and the world are facing now.

Students from civil engineering, computer engineering, computer science, electrical engineering and mechanical engineering disciplines will be selected this summer and take on this challenge as part of their senior design project, a required course to graduate. They will collaborate with peers in art, business and other majors. College faculty and industry partners will serve as project mentors.

Up against strong competitors, Mishra is confident CSUF students will be motivated to develop out-of-the-box ideas for a sustainable house that meets todays needs without compromising the needs of the next generation.

Our diverse Titan team will bring unique experiences and knowledge that will help us create a state-of-the-art design to win this competition and inspire the future of homebuilding in Southern California.

More information about the competition is available at the decathlon website.

Read more from the original source:

CSUF Engineering Team Selected for Competition to Build Sustainable Home, Address Issues Facing Orange County Housing | CSUF News - CSUF News

Read More..

Rimsys and QualiZeal Announce Strategic Partnership for Quality Engineering Transformation – Business Wire

IRVING, Texas--(BUSINESS WIRE)--QualiZeal, a leading Digital Quality Engineering services company, announced strategic long-term partnership with Pittsburgh-based Rimsys, the leading and only holistic RIM software for MedTech. Rimsys has chosen QualiZeal to help enable their desire to build superior quality products and enhance customer experience.

Through this engagement, QualiZeal will work with Rimsys to establish a world class Quality Engineering organization to help Rimsys deliver superior products with a faster time to market.

Brady Ryba, CTO & Co-Founder, Rimsys RIM (Regulatory Information Management) software systems are becoming increasingly necessary as more and more countries adopt specific market entrance requirements and the global regulatory landscape becomes increasingly complex. This leaves MedTech regulatory professionals on the front lines, responsible for correctly deciphering entrance requirements and coordinating the assembly of complex submission documents. QualiZeal shares our quality vision & values and brings in delivery excellence, quality engineering expertise and willingness to walk extra mile for mutual success. I am sure that this partnership will enrich our customer experience and product quality.

Kote Bipilli, SVP Client Success, QualiZeal, said, We are delighted to be have been selected as the Quality Engineering partner to help Rimsys, the leading holistic RIM software provider, in their digital journey. Leveraging our Global delivery model, Quality Engineering offerings and Assets & Platforms we are committed to drive excellence in transforming their software testing methodology, test organization maturity and user experience of the products.

About Rimsys

Rimsys is on a mission to bring regulatory order to the MedTech industry. The Rimsys Regulatory Information Management (RIM) platform digitizes and automates regulatory activities, freeing teams from inefficient administrative work, and helping them confidently establish and secure global regulatory compliance. Unlike complex, color-coded spreadsheets, or expensive external consultants, Rimsys seamlessly centralizes all regulatory information, automates submission processes, and monitors relevant expirations, standards, and global regulations. Traditional approaches to regulatory affairs cant keep pace with the growing complexity of the global landscape, and overburdened teams face increasing compliance risks. Rimsys streamlines all regulatory activities including registrations, essential principles, UDI, standards management, and regulatory intelligence in a single, integrated platform. Leading global MedTech companies including Johnson & Johnson, Siemens Healthiness, and Omron rely on Rimsys to get new products to market more quickly, and reduce revenue risk of non-compliance, product recalls, and unexpected expirations. For more information, visit http://www.rimsys.io.

About QualiZeal

QualiZeal is a trusted partner for end-to-end, Quality Engineering solutions and services for the digital world. We help our clients tackle quality engineering challenges through our innovative solutions that will help them to harness technological changes and gain a competitive advantage. For more information, visit http://www.qualizeal.com.

More:

Rimsys and QualiZeal Announce Strategic Partnership for Quality Engineering Transformation - Business Wire

Read More..

AEP NAMES MARTIN VICE PRESIDENT OF INFRASTRUCTURE ENGINEERING, IT OPERATIONS AND SUPPORT – PR Newswire

COLUMBUS, Ohio, May 31, 2022 /PRNewswire/ -- American Electric Power (Nasdaq: AEP) has named Steven Martin vice president, Infrastructure Engineering, IT Operations & Support, effective May 30. He reports to Therace Risch, executive vice president and chief information & technology officer.

Martin is responsible for the technology planning and delivery for infrastructure technologies including compute, network, storage and end-user tools. He also oversees technology operations and support.

"AEP continues to transform the way our employees work and implement new technologies to streamline our business, while enhancing the customer experience," Risch said. "Steven's focus on providing reliable, cost-effective, and an easy user experience, as well as his deep expertise in operations and infrastructure engineering, make him a valuable addition to our team. We welcome his leadership and insights as we deliver technology solutions that support AEP's efforts to provide clean, reliable and affordable energy."

Martin joins AEP from JCPenney, where he was vice president of Technology Enterprise Services and led information technology infrastructure, operations, support, and cyber functions and carried the dual role of managing director, JCPenney Services India. Prior to JCPenney, he served as senior director of the Technology Operations Center and senior director of Application Support for Target Corp. Martin also worked at Dell for nearly 13 years in roles of increasing responsibility. He received his bachelor's degree in management information systems from Texas Tech University.

American Electric Power, based in Columbus, Ohio, is powering a cleaner, brighter energy future for its customers and communities. AEP's approximately 16,700 employees operate and maintain the nation's largest electricity transmission system and more than 224,000 miles of distribution lines to safely deliver reliable and affordable power to 5.5 million regulated customers in 11 states. AEP also is one of the nation's largest electricity producers with approximately 31,000 megawatts of diverse generating capacity, including more than 7,100 megawatts of renewable energy. The company's plans include growing its renewable generation portfolio to approximately 50% of total capacity by 2030. AEP is on track to reach an 80% reduction in carbon dioxide emissions from 2000 levels by 2030 and has committed to achieving net zero by 2050. AEP is recognized consistently for its focus on sustainability, community engagement, and diversity, equity and inclusion. AEP's family of companies includes utilities AEP Ohio, AEP Texas, Appalachian Power (in Virginia and West Virginia), AEP Appalachian Power (in Tennessee), Indiana Michigan Power, Kentucky Power, Public Service Company of Oklahoma, and Southwestern Electric Power Company (in Arkansas, Louisiana, east Texas and the Texas Panhandle). AEP also owns AEP Energy, which provides innovative competitive energy solutions nationwide. For more information, visit aep.com.

SOURCE American Electric Power

Here is the original post:

AEP NAMES MARTIN VICE PRESIDENT OF INFRASTRUCTURE ENGINEERING, IT OPERATIONS AND SUPPORT - PR Newswire

Read More..

OPINION: Generative design could bring a new burst of innovation to engineering – Professional Engineering

(Credit: Shutterstock)

For an astronaut working in space, perhaps as far away as 240,000 miles from Planet Earth, the design of the life support backpack that provides them with oxygen, heating and cooling inside of their spacesuits couldnt be more important.

It makes sense, then, that when it came to creating its Exploration Portable Life Support System, or xPLSS, NASA contractor Jacobs Engineering Group wanted to explore new realms in design. Its mission: to squeeze the best performance possible out of every kilogram in its life support backpack.

To arrive at their optimum design, engineers at the Houston, Texas-based company used generative tools in PTCs Creo 3D CAD software to create a huge range of options, experimenting with hundreds of combinations of different materials along the way and investigating the viability of a range of manufacturing processes, both traditional and additive manufacturing.

Not only were they able to achieve part mass reduction of around 50%, but they now expect their use of generative design technology to shorten design times by 20%.

Thats an important point, because while generative design is increasingly recognised as a way to challenge design conventions and cast the innovation net wider, its also about getting to better ideas faster often, a lot faster. And for many product design organisations, that could help unlock new territories and markets in 2022.

According to a study by market research company Imarc Group, the global generative design market reached a value of $192.9 million in 2021. And the company expects it to expand at a compound annual growth rate (CAGR) of almost 19% over the next five years, to reach $526 million by 2027.

Companies will invest because, as an April 2022 report from strategy firm McKinsey points out: Design is playing an increasingly important role in companies overall success. The reports authors observe a shift from the design to cost approaches that many adopted two decades ago, to a more modern growth by design approach.

This is better equipping companies to tackle various challenges, they write, such as generating growth through improved ratings; refining the product portfolio more surgically at the attribute level to both reduce redundancy (overlaps) and to address unmet needs (gaps); embracing design for manufacturability; and harnessing the latest technology to optimise geometries.

On this last point, the report picks out two technologies in particular: digital simulation tools such as finite element analysis (FEA) and generative design.

Generative design can help fast track these efforts, bringing to light more sustainable materials options; identifying the most energy-efficient forms of manufacture; and reducing the final mass of products (lightweighting), considerably lowering their consumption of energy and raw materials while at the same time improving their technical performance.

In 2022, the combination of innovation and sustainability makes generative design a compelling prospect for companies. At Volvo, its already helping engineers to 3D print brackets for vehicles that are lighter than ever. At Jacobs, it has enabled product design to reach dizzying new heights. And along the way, it is challenging established ideas of what a product should look like, how it should be made and how it should perform, at every stage in its lifecycle, from initial concept to end of life.

Get to grips with the future factory at Advanced Manufacturing (18-22 July), part of the Engineering Futures webinar series.Register for FREE today.

Content published by Professional Engineering does not necessarily represent the views of the Institution of Mechanical Engineers.

Go here to see the original:

OPINION: Generative design could bring a new burst of innovation to engineering - Professional Engineering

Read More..

TCS recognized as Engineering Services Provider of the Year – Business Standard

By Everest Group

TCS emerged as the #1 player in Engineering Services based on its consistent top performance and leadership position across all five engineering services PEAK Matrix Assessments by - Everest Group - Industry 4.0, Autonomous, Connected, Electric, and Shared (ACES) Automotive, Software Product, Semiconductor and 5G Engineering Services.

Powered by Capital Market - Live News

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

Visit link:

TCS recognized as Engineering Services Provider of the Year - Business Standard

Read More..

Space Command HQ benefits from Colorado’s universities, scientists and aerospace engineers, say officials – Colorado Public Radio

Colorados universities and robust aerospace workforce are part of the latest pitch to keep Space Command headquarters in Colorado. This time its coming from Rep. Joe Neguse and leaders of Colorado's higher education community.

They have all written Defense Sec. Lloyd Austin and Sec. of the Air Force Frank Kendall to highlight Colorados research and scientific labs that would benefit Space Command.

Colorados universities have been training and fostering this talented pool of aerospace engineers and scientists for decades, writes Neguse. As a former Regent of the University of Colorado system, Ive seen first-hand the important work our universities do to grow and maintain a strong aerospace workforce and I believe Colorado remains the best place for this work to continue.

Neguse stressed that Colorado has the second-largest aerospace economy and workforce, and that keeping Space Command at Peterson Space Force Base would help protect national security.

Neguse's letter echos the sentiments of more than 20 academic leaders, who also wrote the two military leaders highlighting the research capabilities in the state.

Our institutions are at the forefront of the nations leading space research, including studying and advancing the knowledge of our Earth Systems as well as investigating Low-Earth Orbit and beyond, they wrote. Addressing areas of strategic importance, including space domain awareness, unmanned aircraft systems, propulsion, remote sensing and cybersecurity, etc., allows our faculty researchers to assist efforts at the Pentagon and on the front lines to keep us safe and protect our way of life.

They offered to host them at one of their institutions during any future visit to the state.

This is the latest attempt by state leaders to convince the Biden administration to revisit the basing decision for the permanent headquarters of Space Command. Former President Donald Trump reportedly decided to move the headquarters to Alabama, over the recommendation from his military leaders to keep the headquarters in Colorado Springs.

Members of the Colorado Congressional delegation believe that the findings from the GAO Inspector General report will show that the methodology for the basing decision was flawed.

That report has yet to be made public.

The rest is here:

Space Command HQ benefits from Colorado's universities, scientists and aerospace engineers, say officials - Colorado Public Radio

Read More..

LSU Mechanical Engineering Faculty Team Up With NASA to Advance Additively Manufactured Materials – Bossier Press-Tribune Online

BATON ROUGE Launch vehicles and propulsion systems are very complex and must survive extreme thermal, dynamic, pressure, and environmental loads. The materials and alloys used in these systems are often challenging to produce, costly, and have long lead times. Thanks to a NASA EPSCoR, or Established Program to Stimulate Competitive Research, and a Louisiana Board of Regents grant, LSU Mechanical Engineering Professors Shengmin Guo and Michael Khonsari are working with NASA and LaSPACE to advance additively manufactured alloys to help reduce cost and lead times.

Our goal through EPSCoR and other partnerships is to advance technologies, including novel alloys, for our missions and commercial spaceflight partners, said Paul Gradl, NASA principal engineer at Marshall Space Flight Center in Huntsville, Ala. Part of our role is to understand the additive manufacturing processes better and provide accessible data so that NASA and industry can make better use of these processes and novel alloys.

For the past 18 months, Guo and Khonsari have been experimenting with alloys used in liquid rocket engine components made by additive manufacturing, or AM, methods, such as laser powder-bed fusion, or L-PBF, and laser powder-directed energy deposition, or LP-DED, methods. When NASA makes parts using additive manufacturing, the parts cost 50 percent less to produce than parts made with traditional manufacturing, and parts can also be produced two to 10 times faster. Traditional parts can take a year to make, whereas, the same part can be made using AM methods in a few weeks, or for the most complex parts, in a few months.

L-PBF metallic 3D parts are fabricated by sequentially and selectively melting thin powder layers according to CAD-directed laser scanning strategies. Multiple laser line scans form the desired 2D section shape, followed by multiple powder deposition/laser irradiation cycles that generate complex 3D metal/alloy parts. LP-DED allows for large AM parts to be fabricated with a deposition head attached to a robot based on a CAD-directed toolpath.

In this project, Guo, Khonsari and their graduate students conducted thermal and mechanical property measurements on more than 30 AM alloys and processes and established protocols for sample preparation, thermal and mechanical property testing, material characterization and data analysis. Supported by EPSCoR and NASA Marshall, this project will provide NASA and industry with detailed datasets regarding thermophysical properties of the metallic AM parts.

We have a lot of complex parts that have internal features and channels that were traditionally made from multiple joining operations [welding and brazing] to fabricate a component, Gradl said. As additive manufacturing processes and metal alloys mature, we must have good understanding of the properties to design for these additive processes that include mechanical and thermophysical properties.

According to Gradl, the thermophysical properties are a critical element of the design, and NASA required a substantial dataset for materials used in additive manufacturing processes, which is where the EPSCoR grant filled a gap. A key thermophysical property is thermal conductivity, particularly in high-temperature components, such as combustion chambers, where heat transfer is critical for the alloy being used.

This project builds upon the successful results of multiple National Science Foundation grants, Louisiana Board of Regents grants and LSUs investments in material and advanced manufacturing research, Guo said.

Apart from thermal property measurements, this team utilized the LSU Center for Rotating Machinery, or CeRoM, equipment to perform mechanical testing and provide mechanical property measurements using the LSU Shared instrumentation Facility. CeRoM houses state-of-the-art fatigue-testing equipment, including rotating bending, fully-reversed bending, torsion bending and tension compression combined with torsion testing apparatuses.

EPSCoR is excited to be associated with this research, said Jeppie Compton, NASA EPSCoR project manager. What is lab research today will one day be normal business, and with this database of properties that the team did methodical studies on, NASA and our industry partners could have a huge advantage for decades to come.

Guos AM alloy thermophysical property work will also be featured in the appendix of a textbook led by NASA titled Metal Additive Manufacturing for Propulsion Applications. This book will be published by American Institute of Aeronautics and Astronautics under the Progress in Astronautics and Aeronautics series.

See the original post:

LSU Mechanical Engineering Faculty Team Up With NASA to Advance Additively Manufactured Materials - Bossier Press-Tribune Online

Read More..

What is quantum computing? – TechTarget

Quantum computing is an area of study focused on the development of computer based technologies centered around the principles ofquantum theory. Quantum theory explains the nature and behavior of energy and matter on thequantum(atomic and subatomic) level. Quantum computing uses a combination ofbitsto perform specific computational tasks. All at a much higher efficiency than their classical counterparts. Development ofquantum computersmark a leap forward in computing capability, with massive performance gains for specific use cases. For example quantum computing excels at like simulations.

The quantum computer gains much of its processing power through the ability for bits to be in multiple states at one time. They can perform tasks using a combination of 1s, 0s and both a 1 and 0 simultaneously. Current research centers in quantum computing include MIT, IBM, Oxford University, and the Los Alamos National Laboratory. In addition, developers have begun gaining access toquantum computers through cloud services.

Quantum computing began with finding its essential elements. In 1981, Paul Benioff at Argonne National Labs came up with the idea of a computer that operated with quantum mechanical principles. It is generally accepted that David Deutsch of Oxford University provided the critical idea behind quantum computing research. In 1984, he began to wonder about the possibility of designing a computer that was based exclusively on quantum rules, publishing a breakthrough paper a few months later.

Quantum Theory

Quantum theory's development began in 1900 with a presentation by Max Planck. The presentation was to the German Physical Society, in which Planck introduced the idea that energy and matter exists in individual units. Further developments by a number of scientists over the following thirty years led to the modern understanding of quantum theory.

Quantum Theory

Quantum theory's development began in 1900 with a presentation by Max Planck. The presentation was to the German Physical Society, in which Planck introduced the idea that energy and matter exists in individual units. Further developments by a number of scientists over the following thirty years led to the modern understanding of quantum theory.

The Essential Elements of Quantum Theory:

Further Developments of Quantum Theory

Niels Bohr proposed the Copenhagen interpretation of quantum theory. This theory asserts that a particle is whatever it is measured to be, but that it cannot be assumed to have specific properties, or even to exist, until it is measured. This relates to a principle called superposition. Superposition claims when we do not know what the state of a given object is, it is actually in all possible states simultaneously -- as long as we don't look to check.

To illustrate this theory, we can use the famous analogy of Schrodinger's Cat. First, we have a living cat and place it in a lead box. At this stage, there is no question that the cat is alive. Then throw in a vial of cyanide and seal the box. We do not know if the cat is alive or if it has broken the cyanide capsule and died. Since we do not know, the cat is both alive and dead, according to quantum law -- in a superposition of states. It is only when we break open the box and see what condition the cat is in that the superposition is lost, and the cat must be either alive or dead.

The principle that, in some way, one particle can exist in numerous states opens up profound implications for computing.

A Comparison of Classical and Quantum Computing

Classical computing relies on principles expressed by Boolean algebra; usually Operating with a 3 or 7-modelogic gateprinciple. Data must be processed in an exclusive binary state at any point in time; either 0 (off / false) or 1 (on / true). These values are binary digits, or bits. The millions of transistors and capacitors at the heart of computers can only be in one state at any point. In addition, there is still a limit as to how quickly these devices can be made to switch states. As we progress to smaller and faster circuits, we begin to reach the physical limits of materials and the threshold for classical laws of physics to apply.

The quantum computer operates with a two-mode logic gate:XORand a mode called QO1 (the ability to change 0 into a superposition of 0 and 1). In a quantum computer, a number of elemental particles such as electrons or photons can be used. Each particle is given a charge, or polarization, acting as a representation of 0 and/or 1. Each particle is called a quantum bit, or qubit. The nature and behavior of these particles form the basis of quantum computing and quantum supremacy. The two most relevant aspects of quantum physics are the principles of superposition andentanglement.

Superposition

Think of a qubit as an electron in a magnetic field. The electron's spin may be either in alignment with the field, which is known as aspin-upstate, or opposite to the field, which is known as aspin-downstate. Changing the electron's spin from one state to another is achieved by using a pulse of energy, such as from alaser. If only half a unit of laser energy is used, and the particle is isolated the particle from all external influences, the particle then enters a superposition of states. Behaving as if it were in both states simultaneously.

Each qubit utilized could take a superposition of both 0 and 1. Meaning, the number of computations a quantum computer could take is 2^n, where n is the number of qubits used. A quantum computer comprised of 500 qubits would have a potential to do 2^500 calculations in a single step. For reference, 2^500 is infinitely more atoms than there are in the known universe. These particles all interact with each other via quantum entanglement.

In comparison to classical, quantum computing counts as trueparallel processing. Classical computers today still only truly do one thing at a time. In classical computing, there are just two or more processors to constitute parallel processing.EntanglementParticles (like qubits) that have interacted at some point retain a type can be entangled with each other in pairs, in a process known ascorrelation. Knowing the spin state of one entangled particle - up or down -- gives away the spin of the other in the opposite direction. In addition, due to the superposition, the measured particle has no single spin direction before being measured. The spin state of the particle being measured is determined at the time of measurement and communicated to the correlated particle, which simultaneously assumes the opposite spin direction. The reason behind why is not yet explained.

Quantum entanglement allows qubits that are separated by large distances to interact with each other instantaneously (not limited to the speed of light). No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated.

Taken together, quantum superposition and entanglement create an enormously enhanced computing power. Where a 2-bit register in an ordinary computer can store only one of four binary configurations (00, 01, 10, or 11) at any given time, a 2-qubit register in a quantum computer can store all four numbers simultaneously. This is because each qubit represents two values. If more qubits are added, the increased capacity is expanded exponentially.

Quantum Programming

Quantum computing offers an ability to write programs in a completely new way. For example, a quantum computer could incorporate a programming sequence that would be along the lines of "take all the superpositions of all the prior computations." This would permit extremely fast ways of solving certain mathematical problems, such as factorization of large numbers.

The first quantum computing program appeared in 1994 by Peter Shor, who developed a quantum algorithm that could efficiently factorize large numbers.

The Problems - And Some Solutions

The benefits of quantum computing are promising, but there are huge obstacles to overcome still. Some problems with quantum computing are:

There are many problems to overcome, such as how to handle security and quantum cryptography. Long time quantum information storage has been a problem in the past too. However, breakthroughs in the last 15 years and in the recent past have made some form of quantum computing practical. There is still much debate as to whether this is less than a decade away or a hundred years into the future. However, the potential that this technology offers is attracting tremendous interest from both the government and the private sector. Military applications include the ability to break encryptions keys via brute force searches, while civilian applications range from DNA modeling to complex material science analysis.

Read the rest here:
What is quantum computing? - TechTarget

Read More..

National Security Memorandum on Promoting United States Leadership in …

NATIONAL SECURITY MEMORANDUM/NSM-10

MEMORANDUM FOR THE VICE PRESIDENT

THE SECRETARY OF STATE

THE SECRETARY OF THE TREASURY

THE SECRETARY OF DEFENSE

THE ATTORNEY GENERAL

THE SECRETARY OF COMMERCE

THE SECRETARY OF ENERGY

THE SECRETARY OF HOMELAND SECURITY

THE ASSISTANT TO THE PRESIDENT AND CHIEF OF STAFF

THE DIRECTOR OF THE OFFICE OF MANAGEMENT BUDGET

THE DIRECTOR OF NATIONAL INTELLIGENCE

THE DIRECTOR OF THE CENTRAL INTELLIGENCE AGENCY

THE ASSISTANT TO THE PRESIDENT FOR NATIONAL

SECURITY AFFAIRS

THE COUNSEL TO THE PRESIDENT

THE ASSISTANT TO THE PRESIDENT FOR ECONOMIC

POLICY AND DIRECTOR OF THE NATIONAL ECONOMIC

COUNCIL

THE DIRECTOR OF THE OFFICE OF SCIENCE AND

TECHNOLOGY POLICY

THE NATIONAL CYBER DIRECTOR

THE CHAIRMAN OF THE JOINT CHIEFS OF STAFF

THE DIRECTOR OF THE FEDERAL BUREAU OF

INVESTIGATION

THE DIRECTOR OF THE NATIONAL SECURITY AGENCY

THE DIRECTOR OF THE NATIONAL INSTITUTE OF

STANDARDS AND TECHNOLOGY

THE DIRECTOR OF THE CYBERSECURITY AND

INFRASTRUCTURE SECURITY AGENCY

SUBJECT: Promoting United States Leadership in Quantum

Computing While Mitigating Risks to Vulnerable

Cryptographic Systems

This memorandum outlines my Administrations policies and initiatives related to quantum computing. It identifies key steps needed to maintain the Nations competitive advantage in quantum information science (QIS), while mitigating the risks of quantum computers to the Nations cyber, economic, and national security. It directs specific actions for agencies to take as the United States begins the multi-year process of migrating vulnerable computer systems to quantum-resistant cryptography. A classified annex to this memorandum addresses sensitive national security issues.

Section 1. Policy. (a) Quantum computers hold the potential to drive innovations across the American economy, from fields as diverse as materials science and pharmaceuticals to finance and energy. While the full range of applications of quantum computers is still unknown, it is nevertheless clear that Americas continued technological and scientific leadership will depend, at least in part, on the Nations ability to maintain a competitive advantage in quantum computing and QIS.

(b) Yet alongside its potential benefits, quantum computing also poses significant risks to the economic and national security of the United States. Most notably, a quantum computer of sufficient size and sophistication also known as a cryptanalytically relevant quantum computer (CRQC) will be capable of breaking much of the public-key cryptography used on digital systems across the United States and around the world. When it becomes available, a CRQC could jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure, and defeat security protocols for most Internet-based financial transactions.

(c) In order to balance the competing opportunities and risks of quantum computers, it is the policy of my Administration: (1) to maintain United States leadership in QIS, through continued investment, partnerships, and a balanced approach to technology promotion and protection; and (2) to mitigate the threat of CRQCs through a timely and equitable transition of the Nations cryptographic systems to interoperable quantumresistant cryptography.

(d) Additional guidance and directives may be required in the future as quantum computing technologies and their associated risks mature.

Sec. 2. Promoting United States Leadership. (a) The United States must pursue a whole-of-government and wholeofsociety strategy to harness the economic and scientific benefits of QIS, and the security enhancements provided by quantum-resistant cryptography. This strategy will require a coordinated, proactive approach to QIS research and development (R&D), an expansion of education and workforce programs, and a focus on developing and strengthening partnerships with industry, academic institutions, allies, and like-minded nations.

(b) The United States must seek to encourage transformative and fundamental scientific discoveries through investments in core QIS research programs. Investments should target the discovery of new quantum applications, new approaches to quantum-component manufacturing, and advances in quantumenabling technologies, such as photonics, nanofabrication, and cryogenic and semiconductor systems.

(c) The United States must seek to foster the next generation of scientists and engineers with quantum-relevant skill sets, including those relevant to quantum-resistant cryptography. Education in QIS and related cybersecurity principles should be incorporated into academic curricula at all levels of schooling to support the growth of a diverse domestic workforce. Furthermore, it is vital that we attract and retain talent and encourage career opportunities that keep quantum experts employed domestically.

(d) To promote the development of quantum technology and the effective deployment of quantum-resistant cryptography, theUnited States must establish partnerships with industry; academia; and State, local, Tribal, and territorial (SLTT) governments. These partnerships should advance joint R&D initiatives and streamline mechanisms for technology transfer between industry and government.

(e) The United States must promote professional and academic collaborations with overseas allies and partners. This international engagement is essential for identifying and following global QIS trends and for harmonizing quantum security and protection programs.

(f) In support of these goals, within 90 days of the date of this memorandum, agencies that fund research in, develop, or acquire quantum computers shall coordinate with the Director of the Office of Science and Technology Policy to ensure a coherent national strategy for QIS promotion and technology protection, including for workforce issues. To facilitate this coordination, all such agencies shall identify a liaison to the National Quantum Coordination Office to share information and best practices, consistent with section 102(b)(3) of the National Quantum Initiative Act (Public Law 115-368) and section 6606 of the National Defense Authorization Act for Fiscal Year 2022 (Public Law 117-81). All coordination efforts shall be undertaken with appropriate protections for sensitive and classified information and intelligence sources and methods.

Sec. 3. Mitigating the Risks to Encryption. (a) Any digital system that uses existing public standards for publickey cryptography, or that is planning to transition to such cryptography, could be vulnerable to an attack by a CRQC. To mitigate this risk, the United States must prioritize the timely and equitable transition of cryptographic systems to quantum-resistant cryptography, with the goal of mitigating as much of the quantum risk as is feasible by 2035. Currently, the Director of the National Institute of Standards and Technology (NIST) and the Director of the National Security Agency (NSA), in their capacity as the National Manager for National Security Systems (National Manager), are each developing technical standards for quantumresistant cryptography for their respective jurisdictions. The first sets of these standards are expected to be released publicly by 2024.

(b) Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards. This effort is an imperative across all sectors of the United States economy, from government to critical infrastructure, commercial services to cloud providers, and everywhere else that vulnerable public-key cryptography is used.

(c) Consistent with these goals:

(i) Within 90 days of the date of this memorandum, the Secretary of Commerce, through the Director of NIST, shall initiate an open working group with industry, including critical infrastructure owners and operators, and other stakeholders, as determined by the Director of NIST, to further advance adoption of quantum-resistant cryptography. This working group shall identify needed tools and data sets, and other considerations to inform the development by NIST of guidance and best practices to assist with quantumresistant cryptography planning and prioritization. Findings of this working group shall be provided, on an ongoing basis, to the Director of the Office of Management and Budget (OMB), the Assistant to the President for National Security Affairs (APNSA), and the National Cyber Director to incorporate into planning efforts.

(ii) Within 90 days of the date of this memorandum, the Secretary of Commerce, through the Director of NIST, shall establish a Migration to Post-Quantum Cryptography Project at the National Cybersecurity Center of Excellence to work with the private sector to address cybersecurity challenges posed by the transition to quantum-resistant cryptography. This project shall develop programs for discovery and remediation of any system that does not use quantum-resistant cryptography or that remains dependent on vulnerable systems.

(iii) Within 180 days of the date of this memorandum, and annually thereafter, the Secretary of Homeland Security, through the Director of the Cybersecurity and Infrastructure Security Agency (CISA), and in coordination with Sector Risk Management Agencies, shall engage with critical infrastructure and SLTT partners regarding the risks posed by quantum computers, and shall provide an annual report to the Director of OMB, the APNSA, and the National Cyber Director that includes recommendations for accelerating those entities migration to quantum-resistant cryptography.

(iv) Within 180 days of the date of this memorandum, and on an ongoing basis, the Director of OMB, in consultation with the Director of CISA, the Director of NIST, the National Cyber Director, and the Director of NSA, shall establish requirements for inventorying all currently deployed cryptographic systems, excluding National Security Systems (NSS). These requirements shall include a list of key information technology (IT) assets to prioritize, interim benchmarks, and a common (and preferably automated) assessment process for evaluating progress on quantum-resistant cryptographic migration in IT systems.

(v) Within 1 year of the date of this memorandum, and on an annual basis thereafter, the heads of all Federal Civilian Executive Branch (FCEB) Agencies shall deliver to the Director of CISA and the National Cyber Director an inventory of their IT systems that remain vulnerable to CRQCs, with a particular focus on High Value Assets and High Impact Systems. Inventories should include current cryptographic methods used on IT systems, including system administrator protocols, non-security software and firmware that require upgraded digital signatures, and information on other key assets.

(vi) By October 18, 2023, and on an annual basis thereafter, the National Cyber Director shall, based on the inventories described in subsection 3(c)(v) of this memorandum and in coordination with the Director of CISA and the Director of NIST, deliver a status report to the APNSA and the Director of OMB on progress made by FCEB Agencies on their migration of non-NSS IT systems to quantum-resistant cryptography. This status report shall include an assessment of the funding necessary to secure vulnerable IT systems from the threat posed by adversarial access to quantum computers, a description and analysis of ongoing coordination efforts, and a strategy and timeline for meeting proposed milestones.

(vii) Within 90 days of the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, andon an annual basis thereafter, as needed, the Secretary of Commerce, through the Director of NIST, shall release a proposed timeline for the deprecation of quantum-vulnerable cryptography in standards, with the goal of moving the maximum number of systems off quantum-vulnerable cryptography within a decade of the publication of the initial set of standards. The Director of NIST shall work with the appropriate technical standards bodies to encourage interoperability of commercial cryptographic approaches.

(viii) Within 1 year of the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, the Director of OMB, in coordination with the Director of CISA and the Director of NIST, shall issue a policy memorandum requiring FCEB Agencies to develop a plan to upgrade their non-NSS IT systems to quantum-resistant cryptography. These plans shall be expeditiously developed and be designed to address the most significant risks first. The Director of OMB shall work with the head of each FCEB Agency to estimate the costs to upgrade vulnerable systems beyond already planned expenditures, ensure that each plan is coordinated and shared among relevant agencies to assess interoperability between solutions, and coordinate with the National Cyber Director to ensure plans are updated accordingly.

(ix) Until the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, the heads of FCEB Agencies shall not procure any commercial quantum-resistant cryptographic solutions for use in IT systems supporting enterprise and mission operations. However, to assist with anticipating potential compatibility issues, the heads of such FCEB Agencies should conduct tests of commercial solutions that have implemented pre-standardized quantum-resistant cryptographic algorithms. These tests will help identify interoperability or performance issues that may occur in Federal environments at an early stage and will contribute to the mitigation of those issues. The heads of such FCEB Agencies should continue to implement and, where needed, upgrade existing cryptographic implementations, but should transition to quantum-resistant cryptography only once the first set of NIST standards for quantum-resistant cryptography is complete and implemented in commercial products. Conformance with international standards should be encouraged, and may be required for interoperability.

(x) Within 1 year of the date of this memorandum, and annually thereafter, the Director of NSA, serving in its capacity as the National Manager, in consultation with the Secretary of Defense and the Director of National Intelligence, shall provide guidance on quantum-resistant cryptography migration, implementation, and oversight for NSS. This guidance shall be consistent with National Security Memorandum/NSM-8 (Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems). The National Manager shall share best practices and lessons learned with the Director of OMB and the National Cyber Director, as appropriate.

(xi) Within 1 year of the date of this memorandum, and on an ongoing basis, and consistent with section 1 of NSM-8, the heads of agencies operating NSS shall identify and document all instances where quantum-vulnerable cryptography is used by NSS and shall provide this information to the National Manager.

(xii) Within 180 days of issuance by the National Manager of its standards on quantum-resistant cryptography referenced in section 3(a) of this memorandum, and annually thereafter, the National Manager shall release an official timeline for the deprecation of vulnerable cryptography in NSS, until the migration to quantum-resistant cryptography is completed.

(xiii) Within 1 year of issuance by the National Manager of its standards on quantum-resistant cryptography for referenced in subsection 3(a) of this memorandum, and annually thereafter, the heads of agencies operating or maintaining NSS shall submit to the National Manager, and, as appropriate, the Department of Defense Chief Information Officer or the Intelligence Community Chief Information Officer, depending on their respective jurisdictions, an initial plan to transition to quantumresistant cryptography in all NSS. These plans shall be updated annually and shall include relevant milestones, schedules, authorities, impediments, funding requirements, and exceptions authorized by the head of the agency in accordance with section 3 of NSM-8 and guidance from the National Manager.

(xiv) By December 31, 2023, agencies maintaining NSS shall implement symmetric-key protections (e.g., High Assurance Internet Protocol Encryptor (HAIPE) exclusion keys or VPN symmetric key solutions) to provide additional protection for quantum-vulnerable key exchanges, where appropriate and in consultation with the National Manager. Implementation should seek to avoid interference with interoperability or other cryptographic modernization efforts.

(xv) By December 31, 2023, the Secretary of Defense shall deliver to the APNSA and the Director of OMB an assessment of the risks of quantum computing to the defense industrial base and to defense supply chains, along with a plan to engage with key commercial entities to upgrade their IT systems to achieve quantum resistance.

Sec. 4. Protecting United States Technology. (a) In addition to promoting quantum leadership and mitigating the risks of CRQCs, the United States Government must work to safeguard relevant quantum R&D and intellectual property (IP) and to protect relevant enabling technologies and materials. Protection mechanisms will vary, but may include counterintelligence measures, well-targeted export controls, and campaigns to educate industry and academia on the threat of cybercrime and IP theft.

(b) All agencies responsible for either promoting or protecting QIS and related technologies should understand the security implications of adversarial use and consider those security implications when implementing new policies, programs, and projects.

(c) The United States should ensure the protection of U.S.developed quantum technologies from theft by our adversaries. This will require campaigns to educate industry, academia, and SLTT partners on the threat of IP theft and on the importance of strong compliance, insider threat detection, and cybersecurity programs for quantum technologies. As appropriate, Federal law enforcement agencies and other relevant agencies should investigate and prosecute actors who engage in the theft of quantum trade secrets or who violate United States export control laws. To support efforts to safeguard sensitive information, Federal law enforcement agencies should exchange relevant threat information with agencies responsible for developing and promoting quantum technologies.

(d) Consistent with these goals, by December 31, 2022, the heads of agencies that fund research in, develop, or acquire quantum computers or related QIS technologies shall develop comprehensive technology protection plans to safeguard QIS R&D, acquisition, and user access. Plans shall be coordinated across agencies, including with Federal law enforcement, to safeguard quantum computing R&D and IP, acquisition, and user access. These plans shall be updated annually and provided to the APNSA, the Director of OMB, and the Co-Chairs of the National Science and Technology Council Subcommittee on Economic and Security Implications of Quantum Science.

Sec. 5. Definitions. For purposes of this memorandum:

(a) the term agency has the meaning ascribed to it under 44 U.S.C. 3502;

(b) the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the UnitedStates that their incapacitation or destruction would have a debilitating effect on the Nations security, economy, public health and safety, or any combination thereof;

(c) the term cryptographic agility means a design feature that enables future updates to cryptographic algorithms and standards without the need to modify or replace the surrounding infrastructure;

(d) the term cryptanalytically relevant quantum computer or CRQC means a quantum computer capable of undermining current public-key cryptographic algorithms;

(e) the term Federal Civilian Executive Branch Agency or FCEB Agency means any agency except the Department of Defense or agencies in the Intelligence Community;

(f) the term high value asset means information or an information system that is so critical to an organization that the loss or corruption of this information, or loss of access to the system, would have serious impacts on the organizations ability to perform its mission or conduct business;

(g) the term high impact system means an information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a Federal Information Processing Standards (FIPS) 199 potential impact value of high;

(h) the term information technology or IT has the meaning ascribed to it under 44 U.S.C. 3502;

(i) the term National Security Systems or NSS has the meaning ascribed to it in 44 U.S.C 3552(b)(6) and shall also include other Department of Defense and Intelligence Community systems, as described in 44 U.S.C. 3553(e)(2) and 44 U.S.C.3553(e)(3);

(j) the term quantum computer means a computer utilizing the collective properties of quantum states, such as superposition, interference and entanglement, to perform calculations. The foundations in quantum physics give a quantum computer the ability to solve a subset of hard mathematical problems at a much faster rate than a classical (i.e., nonquantum) computer;

(k) the term quantum information sciences or QIS has the meaning ascribed to it under 15 U.S.C. 8801(6) and means the study and application of the laws of quantum physics for the storage, transmission, manipulation, computing, or measurement of information; and

(l) the term quantum-resistant cryptography means those cryptographic algorithms or methods that are assessed not to be specifically vulnerable to attack by either a CRQC or classical computer. This is also referred to as post-quantum cryptography.

Sec. 6. General Provisions. (a) Nothing in this memorandum shall be construed to impair or otherwise affect:

(i) the authority granted by law to an executive department or agency, or the head thereof, to include the protection of intelligence sources and methods; or

(ii) the functions of the Director of OMB relating to budgetary, administrative, or legislative proposals.

(b) This memorandum shall be implemented consistent with applicable law and subject to the availability of appropriations.

(c) This memorandum shall also be implemented without impeding the conduct or support of intelligence activities, and all implementation measures shall be designed to be consistent with appropriate protections for sensitive information and intelligence sources and methods.

(d) This memorandum is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the UnitedStates, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

JOSEPH R. BIDEN JR.

Continued here:
National Security Memorandum on Promoting United States Leadership in ...

Read More..