Page 3,912«..1020..3,9113,9123,9133,914..3,9203,930..»

iPhone Sales and Wearables Help Crush Apple Earnings – Nasdaq

Earnings is off and running and the Paper Traders team has all the news to keep you up to date. We first take a deep dive into Apples AAPL earnings report and to our surprise, they did fantastic and investors showed it! They went on to beat expectations across the board. iPhone sales, services, and their other category were big winners for the company showing strong holiday sales! Can Apple manage to keep up this momentum heading into the 2020?

We also run down Boeings BA earnings as they report a loss for the first time since 1997. This didnt seem to surprise investors much and must have been priced in because as of Wednesday morning they were in the green! Boeing attributes the loss to the continued problems with the 737 MAX and it doesnt seem to have an end in sight. The costs associated with the 737 Max have totaled to almost $18 billion, which is double what they expected in last quarter. The problems only seem to get larger but investors continue to hang on. To get recent Zacks video updates, be sure to subscribe to our channel and leave a comment or questions!

Looking for Stocks with Skyrocketing Upside?

Zacks has just released a Special Report on the booming investment opportunities of legal marijuana.

Ignited by new referendums and legislation, this industry is expected to blast from an already robust $6.7 billion to $20.2 billion in 2021. Early investors stand to make a killing, but you have to be ready to act and know just where to look.

See the pot trades we're targeting>>

MGM Resorts International (MGM): Free Stock Analysis Report

Wynn Resorts, Limited (WYNN): Free Stock Analysis Report

The Boeing Company (BA): Free Stock Analysis Report

Apple Inc. (AAPL): Free Stock Analysis Report

To read this article on Zacks.com click here.

Zacks Investment Research

The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.

Go here to read the rest:
iPhone Sales and Wearables Help Crush Apple Earnings - Nasdaq

Read More..

nCipher Security: More Americans trust encryption than know what it is – Security Boulevard

New survey data reveals whatand how muchAmericans understand about encryption

nCipher Security, an Entrust Datacard company and provider of trust, integrity and control for business-critical information and applications, announces the results of a new survey exploring how much the average American knows about encryption.

One of the most interesting findings of the survey, fielded by nCipher to more than 1,000 U.S. adults, found that Americans are familiar withand trustthe concept of encryption, even if they are a bit fuzzy on exactly how it works.

Encryption is a key technology in protecting sensitive information such as social security numbers, government IDs and financial data, said Peter Galvin, chief strategy officer, at nCipher Security. It is also an important part of personal data privacy. Owing to domestic and international compliance regulations and ongoing policy debates, we expect the conversation around encryption to reach a crescendo this year.

Almost three-quarters (72.1%) of Americans surveyed know that encryption is the process of making data unreadable to anyone other than those holding the encryption keys. Even more Americans (87.4%) know that encryption is important.

When asked what encryption is able to secure, most Americans thought of financial data and transactions. Top answers included online banking (55.7%), financial information (52.6%), mobile payments (46%), mobile phone data (43.1%), and mobile wallets (42%).

In terms of the average Americans relationship with encryption, the survey also revealed that:

Nearly three-quarters (74%) of respondents say a formal seal of encryption (like the green check used with secure e-payments) would make them feel that their private information was secure online.

Likewise, 47.9% of Americans would trust a company that used such a seal, and 30% would expect that the data security of such a company was validated by a third party.

Among institutions, Americans most trust the financial services industry to encrypt their data (54.9%), followed by healthcare (38.7%) and technology (36.1%) industries. In contrast, only 10% of Americans trust that companies in the travel and tourism industry encrypt their sensitive data.

More than half of Americans (55.5%) believe their private data is safe in the cloud as long as its encrypted. A little more than a quarter (29.4%) arent quite sure. Only 15.1% believe it isnt.

However, 65.2% believe hackers can access confidential info even if its encrypted.

Hackers arent the only threat to Americans peace of mind when it comes to encryption and cybersecurity, however. Only 14% of Americans believe that artificial intelligence cant outsmart encryption. The rest either believe it could (45.6%) or dont know (40.4%).

For all of the hype around artificial intelligence, its unlikely that well see an AI sophisticated enough to outsmart encryption in the near future, added Galvin. Encryption is as water-tight as cybersecurity gets.

Have questions about how encryption works, or general questions about data protection? Visit nCiphers encryption FAQ page to find out (almost) everything you need to know.

Continue reading here:
nCipher Security: More Americans trust encryption than know what it is - Security Boulevard

Read More..

Encryption Software Market 2020 Analysis by Current Industry Status, Key Manufacturers, Industry Drivers and Forecast to 2024 Dagoretti News -…

The Encryption Software Market 2019-2024 Research Report is a professional and in-depth study on the current state of the Encryption Software industry with a focus on the Global market. The report provides key statistics on the market status of the Encryption Software manufacturers and is a valuable source of guidance and direction for companies and individuals interested in the industry.

Download Sample Copy of Encryption Software Market @https://www.orbisresearch.com/contacts/request-sample/2678103

The report displays significant strategies which are articulated taking into a loop on technical data figures which have been sourced from the effective database. The Encryption Software Market report consists of prime information which could be an efficient read such as investment return analysis, investment feasibility analysis, trends analysis, recommendations for growth. The report also clears the vision of readers with an objective assessment of Encryption Software Market providing crucial insights from technical and marketing experts.

Top Players:

Sophos

Checkpoint Software Technologies

Trend Micro

Symantec Corporation

IBM Corporation

Sas Institute

Encryption SoftwareMarket, projects a standardized and in-depth study on the ongoing state of Market, providing basic industry insights such as definitions, classifications, supply chain, applications and industry cost structure. The report precisely delivers productive information about development policies and plans as well as manufacturing processes and techniques.

The key insights of the report:

The report provides key statistics on the market status of the Encryption Software manufacturers and is a valuable source of guidance and direction for companies and individuals interested in the industry.

The report provides a basic overview of the industry including its definition, applications and manufacturing technology.

The report presents the company profile, product specifications, capacity, production value, and 2013-2018 market shares for key vendors.

The total market is further divided by company, by country, and by application/type for the competitive landscape analysis.

The report estimates 2019-2024 market development trends of Encryption Software industry.

Analysis of upstream raw materials, downstream demand, and current market dynamics is also carried out

The report makes some important proposals for a new project of Encryption Software Industry before evaluating its feasibility.

To know more about Encryption Software Market Visit @https://www.orbisresearch.com/reports/index/global-Encryption Software-market-report-2019-history-present-and-future

Market Segments:

For product type segment, this report listed main product type of Encryption Software market

On-premises

Cloud

For end use/application segment, this report focuses on the status and outlook for key applications. End users sre also listed.

Disk encryption

File/folder encryption

Database encryption

Communication encryption

Cloud encryption

For geography segment, regional supply, application-wise and type-wise demand, major players, price is presented from 2013 to 2023. This report covers following regions:

North America

South America

Asia & Pacific

Europe

MEA (Middle East and Africa)

The Encryption Software Market report also carries the studies of Demand and supply dynamics, import and export scenario, industry processes and cost structures. As every market has a future perspective and expert point of view, this report holds an information related current and future market trends and regulations which are supremely organized in the report. This report will evaluate industry-leading tools and techniques of Encryption Software Market. The report briefly indicates about the current and future market share and size of the Global industry.

In the end, the report makes some important proposals for a new project of Encryption Software Industry before evaluating its feasibility. Overall, the report provides an in-depth insight of 2019-2024 Encryption Software industry covering all important parameters.

Market Highlights:

Analyzing the outlook of the Encryption Software market with the recent trends and SWOT analysis

Market dynamics scenario, along with growth opportunities of the market in the years to come

Encryption Software Market segmentation analysis including qualitative and quantitative research incorporating the impact of economic and non-economic aspects

Regional and country level analysis integrating the demand and supply forces that are influencing the growth of the market.

Encryption Software Market value (USD Million) and volume (Units Million) data for each segment and sub-segment

Competitive landscape involving the market share of major players, along with the new projects and strategies adopted by players in the past five years

Comprehensive company profiles covering the product offerings, key financial information, recent developments, SWOT analysis, and strategies employed by the major market players

1-year analyst support, along with the data support in excel format.

Enquire before buying @https://www.orbisresearch.com/contacts/enquiry-before-buying/2678103

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector Costello

Senior Manager Client Engagements

4144N Central Expressway,

Suite 600, Dallas,

Texas 75204, U.S.A.

Phone No.: +1 (214) 884-6817; +9120641 01019

Email id:[emailprotected]

See the original post here:
Encryption Software Market 2020 Analysis by Current Industry Status, Key Manufacturers, Industry Drivers and Forecast to 2024 Dagoretti News -...

Read More..

Emerging Opportunities in Hardware-based Full Disk Encryption Market with Current Trends Analysis – Dagoretti News

The Hardware-based Full Disk Encryption market study Added by Market Study Report provides an in-depth analysis pertaining to potential drivers fueling this industry. The study also encompasses valuable insights about profitability prospects, market size, growth dynamics, and revenue estimation of the business vertical. The study further draws attention to the competitive backdrop of renowned market contenders including their product offerings and business strategies.

The report gives a far-reaching examination of the Hardware-based Full Disk Encryption industry advertise by sorts, applications, players and locales. This report additionally shows the 2014-2024 generation, Consumption, income, Gross edge, Cost, Gross, piece of the overall industry, CAGR, and Market impacting elements of the Hardware-based Full Disk Encryption industry.

Request Sample Report @ https://www.researchmoz.com/enquiry.php?type=S&repid=2096592&source=atm

A rundown of the competitive spectrum:

The following manufacturers are covered:Seagate Technology PLCWestern Digital CorpSamsung ElectronicsToshibaKingstonMicron Technology IncIntel

Segment by RegionsNorth AmericaEuropeChinaJapan

Segment by TypeHard Disk Drive (HDD) FDESolid State Drives (SSD) FDE

Segment by ApplicationIT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

In-depth information about the sales volume and the market share accumulated by each of the company, in addition to the revenue margin of every player is elucidated.

A basic outline of the company, along with its chief rivals and its manufacturing base has also been provided.

The report encompasses, in minute detail, information regarding the products manufactured by every company of Hardware-based Full Disk Encryption market, product specifications, as well as their application scope.

The report is also inclusive the price patterns and the gross margins of the industry magnates.

The revenue and market share accumulated by every region has been enumerated in the report, in addition to the sales forecast and the volume.

The present status of the regional markets in this business sphere in addition to the prospects that every region holds in Hardware-based Full Disk Encryption market in the years to come has been provided.

The projected growth rate of every region in Hardware-based Full Disk Encryption market over the forecast timeline has also been discussed about.

Make An EnquiryAbout This Report @ https://www.researchmoz.com/enquiry.php?type=E&repid=2096592&source=atm

An outline of the Hardware-based Full Disk Encryption market segmentation:

The report elucidates the Hardware-based Full Disk Encryption market in terms of the product landscape, split into Medical Service and Medicine Marketing.

Details regarding the revenue amassed by every product in tandem with the volume share have been enlisted.

The market share accumulated by every product in Hardware-based Full Disk Encryption market has been specified as well.

The report is inclusive of the application landscape of this industry, segmented into Hospitals and Clinics.

The study encompasses the revenue that every application segment accounts for, as well as the volume and market share of the application.

You can Buy This Report from Here @ https://www.researchmoz.com/checkout?rep_id=2096592&licType=S&source=atm

The Hardware-based Full Disk Encryption market report enumerates quite some details about the factors impacting the industry, influence of technological developments on the vertical, risks, as well as the threats that substitutes present to the industry players. In addition, information about the changing preferences and needs of consumers in conjunction with the impact of the shifting dynamics of the economic and political scenario on the Hardware-based Full Disk Encryption market has also been acknowledged in the study.

Highlights of the Hardware-based Full Disk Encryption market report:

Read the original:
Emerging Opportunities in Hardware-based Full Disk Encryption Market with Current Trends Analysis - Dagoretti News

Read More..

Scientists from Israel have developed the worlds first optical encryption technology Stealth – The Times Hub

Scientists working at the University of Ben Gurion in the Negev (Israel) said that the developed all-optical encryption technology Stealth. According to the authors of the study, due to this, soon will be able to provide maximum security for the transmission of information.

To date, all data is encrypted through the use of digital methods. As for transmission, it is accomplished using fiber-optic networks. Time and amount of effort expended on security and privacy technology.

The above problems are solved by the development of the Israeli scientists. They found a universal solution that provides direct encoding, transmission, decoding data in optical form. In this case, this process involved the usual equipment. The method is based on the distribution of transmission immediately in many colors, in the specified band of the spectrum. Along with this, are formed the weaker the flow of information that is hidden under the noise.

According to scientists, the method has not been without the phase mask, changing the color of the wave. In the end, it also manifests itself as noise, according to the portal Planet Today.

Natasha Kumar is a general assignment reporter at the Times Hub. She has covered sports, entertainment and many other beats in her journalism career, and has lived in Manhattan for more than 8 years. She studies in University of Calcutta. Natasha has appeared periodically on national television shows and has been published in (among others) Hindustan Times, Times of India

See the rest here:
Scientists from Israel have developed the worlds first optical encryption technology Stealth - The Times Hub

Read More..

Government Report Reveals Its Favorite Way to Hack iPhones, Without Backdoors – VICE

The US government is once again reviving its campaign against strong encryption, demanding that tech companies build backdoors into smartphones and give law enforcement easy, universal access to the data inside them.

At least two companies that sell phone-cracking tools to agencies like the FBI have proven they can defeat encryption and security measures on some of the most advanced phones on the market. And a series of recent tests conducted by the National Institute of Standards and Technology (NIST) reveal that, while there remain a number of blind spots, the purveyors of these tools have become experts at reverse engineering smartphones in order to extract troves of information off the devices and the apps installed on them.

Asked whether the NIST test results have any bearing on the public debate about backdoors for police, Barbara Guttman, who oversees the Computer Forensic Tool Testing program for NIST told Motherboard, None at all.

This is a completely different question. Thats a policy question, she said, adding that NISTs only purpose is to ensure that If youre acquiring the phone [data], you should acquire it correctly.

But the demonstrated ability of phone cracking tools to break into and extract data from the latest phones is further proof that the government is perfectly capable of getting into terrorists devices, Andres Arrieta, the director of consumer privacy engineering at the Electronic Frontier Foundation, told Motherboard.

When it comes to the capabilities from law enforcement, I think these documents show theyre quite capable, he said. In the San Bernardino case, they claimed they didnt have the capabilities and they made a big circus out of it, and it turned out they did. Theyve proven consistently that they have the tools.

The never-ending public debate over smartphone security has focused on backdoors for law enforcement to bypass device encryptionand more recently, Apple features that erase all data after 10 failed password attempts or block data extraction through lightning ports. But accessing a phone is only part of the battle; once inside, digital forensic investigators have to understand the complicated data structures they find and translate them into a format that meets the high accuracy standards for evidence, using acquisition tools from companies like Cellebrite, Grayshift, and MSAB.

Results from an NIST test of Cellebrite found that it largely works as expected.

In a series of reports published over the last year, NISTs Computer Forensic Tool Testing program documented how well the latest tools perform that task on dozens of different smartphones and apps. The tests paint a picture of an industry trying to keep pace with the constantly changing smartphones and social media landscapewith mixed results.

Lets say you can get into the phone, you can defeat the encryption. Now you have a blob of ones and zeros, Bob Osgood, a veteran FBI agent who is now the director of digital forensics at George Mason University, told Motherboard. Smartphones contain millions of lines of code, the structures of which differ between every device and can change with every OS or app update. Cracking a phones encryption doesnt necessarily mean an investigator can access the code on it, including deleted and hidden files, hence the need for the tools tested by NIST. In the digital forensics world, the state of complete Nirvana is to get a complete image of the phone, Osgood said. The amount of technical know-how it takes to actually do this stuffreverse engineer, beat the encryption, get data itselfis massive. There are a million moving targets.

Take Cellebrite, the Israeli company whose Universal Forensic Extraction Device (UFED) is a favorite of police departments and the FBI. In June, the company announced that its new premium tool could crack the encryption on any iOS device and many top-end Androidsa major win for law enforcement agencies that had been complaining about built-in encryption.

The companys current UFED 4PC software is then capable of accurately extracting the vast majority of important device informationGPS data, messages, call logs, contactsfrom an iPhone X and most previous models, according to a NIST test from April. It was able to partially extract data from Twitter, LinkedIn, Instagram, Pinterest, and Snapchat as well. NIST did not test the extraction ability for other apps, like Signal.

UFED 4PC could not extract email data from newer iPhone models, but police can gain access to cloud email services like Gmail with a warrant.

Results from Cellebrite on Android phones

Cellebrite was less successful with phones running Android and other operating systems, though. The UFED tool was unable to properly extract any social media, internet browsing, or GPS data from devices like the Google Pixel 2 and Samsung Galaxy S9 or messages and call logs from the Ellipsis 8 and Galaxy Tab S2 tablets. It got absolutely nothing from Huaweis P20 Pro phone.

Some of the newer operating systems are harder to get data from than others. I think a lot of these [phone] companies are just trying to make it harder for law enforcement to get data from these phones ... under the guise of consumer privacy, Detective Rex Kiser, who conducts digital forensic examinations for the Fort Worth Police Department, told Motherboard. Right now, were getting into iPhones. A year ago we couldnt get into iPhones, but we could get into all the Androids. Now we cant get into a lot of the Androids.

Cellebrite, which did not respond to requests for comment, frequently updates its products to address the failures discovered in testing and in the field, experts said, so the weaknesses NIST identified may no longer exist. Previous NIST testing data, though, shows that many blindspots can last for years.

It is important to note that just because a cracking tool cant successfully extract data doesnt mean a forensic investigator cant eventually get to it. The process just becomes much longer, and requires significant expertise.

Kiser said that Cellebrite is currently the industry leader for most devices. The exception is iPhones, where Grayshift, an Atlanta-based company that counts an ex-Apple security engineer among its top staff, has taken the lead.

Like Cellebrite, Grayshift claims that its GrayKey toolwhich it sells to police for between $15,000 and $30,000can also crack the encryption on any iPhone. And once inside, NIST test results show that GrayKey can completely extract every piece of data off an iPhone X, with the exception of Pinterest data, where the tool achieved partial extraction.

Grayshift did not respond to a request for comment.

Other products, like Virginia-based Parabens E3:DS or Swedish MSABs XRY displayed weaknesses in acquiring social media, internet browsing, and GPS data for several phones. Some of those tests, though, are older than the recent results for Cellebrite and Grayshift.

In the NIST tests, both Cellebrite and Grayshift devices were able to extract nearly all the data from an iPhone 7one of the phones used by the Pensacola naval air station shooter. That incident prompted the Department of Justices latest call for phone manufacturers to create encryption backdoors, despite ample evidence that hacking tools can break into the latest, most privacy conscious phones, like the iPhone 11 Pro Max.

This whole thing with the new terrorists and [the FBI] cant get into their phones, thats complete BS, Jerry Grant, a private New York digital forensic examiner who uses Cellebrite tools, told Motherboard.

Link:
Government Report Reveals Its Favorite Way to Hack iPhones, Without Backdoors - VICE

Read More..

What Is Quantum Computing and How Does it Work? – Built In

Accustomed to imagining worst-case scenarios, many cryptography experts are more concerned than usual these days: one of the most widely used schemes for safely transmitting data is poised to become obsolete once quantum computing reaches a sufficiently advanced state.

The cryptosystem known as RSA provides the safety structure for a host of privacy and communication protocols, from email to internet retail transactions. Current standards rely on the fact that no one has the computing power to test every possible way to de-scramble your data once encrypted, but a mature quantum computer could try every option within a matter of hours.

It should be stressed that quantum computers havent yet hit that level of maturity and wont for some time but when a large, stable device is built (or if its built, asan increasingly diminishing minority argue), its unprecedented ability to factor large numbers would essentially leave the RSA cryptosystem in tatters. Thankfully, the technology is still a ways away and the experts are on it.

Dont panic. Thats what Mike Brown, CTO and co-founder of quantum-focused cryptography company ISARA Corporation, advises anxious prospective clients. The threat is far from imminent. What we hear from the academic community and from companies like IBM and Microsoft is that a 2026-to-2030 timeframe is what we typically use from a planning perspective in terms of getting systems ready, he said.

Cryptographers from ISARA are among several contingents currently taking part in the Post-Quantum Cryptography Standardization project, a contest of quantum-resistant encryption schemes. The aim is to standardize algorithms that can resist attacks levied by large-scale quantum computers. The competition was launched in 2016 by the National Institute of Standards and Technology (NIST), a federal agency that helps establish tech and science guidelines, and is now gearing up for its third round.

Indeed, the level of complexity and stability required of a quantum computer to launch the much-discussed RSA attack is very extreme, according to John Donohue, scientific outreach manager at the University of Waterloos Institute for Quantum Computing. Even granting that timelines in quantum computing particularly in terms of scalability are points of contention, the community is pretty comfortable saying thats not something thats going to happen in the next five to 10 years, he said.

When Google announced that it had achieved quantum supremacy or that it used a quantum computer to run, in minutes, an operation that would take thousands of years to complete on a classical supercomputer that machine operated on 54 qubits, the computational bedrocks of quantum computing. While IBMs Q 53 system operates at a similar level, many current prototypes operate on as few as 20 or even five qubits.

But how many qubits would be needed to crack RSA? Probably on the scale of millions of error-tolerant qubits, Donohue told Built In.

Scott Aaronson, a computer scientist at the University of Texas at Austin, underscored the same last year in his popular blog after presidential candidate Andrew Yang tweeted that no code is uncrackable in the wake of Googles proof-of-concept milestone.

Thats the good news. The bad news is that, while cryptography experts gain more time to keep our data secure from quantum computers, the technologys numerous potential upsides ranging from drug discovery to materials science to financial modeling is also largely forestalled. And that question of error tolerance continues to stand as quantum computings central, Herculean challenge. But before we wrestle with that, lets get a better elemental sense of the technology.

Quantum computers process information in a fundamentally different way than classical computers. Traditional computers operate on binary bits information processed in the form of ones or zeroes. But quantum computers transmit information via quantum bits, or qubits, which can exist either as one or zero or both simultaneously. Thats a simplification, and well explore some nuances below, but that capacity known as superposition lies at the heart of quantums potential for exponentially greater computational power.

Such fundamental complexity both cries out for and resists succinct laymanization. When the New York Times asked 10 experts to explain quantum computing in the length of a tweet, some responses raised more questions than they answered:

Microsoft researcher David Reilly:

A quantum machine is a kind of analog calculator that computes by encoding information in the ephemeral waves that comprise light and matter at the nanoscale.

D-Wave Systems executive vice president Alan Baratz:

If were honest, everything we currently know about quantum mechanics cant fully describe how a quantum computer works.

Quantum computing also cries out for a digestible metaphor. Quantum physicist Shohini Ghose, of Wilfrid Laurier University, has likened the difference between quantum and classical computing to light bulbs and candles: The light bulb isnt just a better candle; its something completely different.

Rebecca Krauthamer, CEO of quantum computing consultancy Quantum Thought, compares quantum computing to a crossroads that allows a traveler to take both paths. If youre trying to solve a maze, youd come to your first gate, and you can go either right or left, she said. We have to choose one, but a quantum computer doesnt have to choose one. It can go right and left at the same time.

It can, in a sense, look at these different options simultaneously and then instantly find the most optimal path, she said. That's really powerful.

The most commonly used example of quantum superposition is Schrdingers cat:

Despite its ubiquity, many in the QC field arent so taken with Schrodingers cat. The more interesting fact about superposition rather than the two-things-at-once point of focus is the ability to look at quantum states in multiple ways, and ask it different questions, said Donohue. That is, rather than having to perform tasks sequentially, like a traditional computer, quantum computers can run vast numbers of parallel computations.

Part of Donohues professional charge is clarifying quantums nuances, so its worth quoting him here at length:

In superposition I can have state A and state B. I can ask my quantum state, are you A or B? And it will tell me, I'm a or I'm B. But I might have a superposition of A + B in which case, when I ask it, Are you A or B? Itll tell me A or B randomly.

But the key of superposition is that I can also ask the question, Are you in the superposition state of A + B? And then in that case, they'll tell me, Yes, I am the superposition state A + B.

But theres always going to be an opposite superposition. So if its A + B, the opposite superposition is A - B.

Thats about as simplified as we can get before trotting out equations. But the top-line takeaway is that that superposition is what lets a quantum computer try all paths at once.

Thats not to say that such unprecedented computational heft will displace or render moot classical computers. One thing that we can really agree on in the community is that it wont solve every type of problem that we run into, said Krauthamer.

But quantum computing is particularly well suited for certain kinds of challenges. Those include probability problems, optimization (what is, say, the best possible travel route?) and the incredible challenge of molecular simulation for use cases like drug development and materials discovery.

The cocktail of hype and complexity has a way of fuzzing outsiders conception of quantum computing which makes this point worth underlining: quantum computers exist, and they are being used right now.

They are not, however, presently solving climate change, turbocharging financial forecasting probabilities or performing other similarly lofty tasks that get bandied about in reference to quantum computings potential. QC may have commercial applications related to those challenges, which well explore further below, but thats well down the road.

Today, were still in whats known as the NISQ era Noisy, Intermediate-Scale Quantum. In a nutshell, quantum noise makes such computers incredibly difficult to stabilize. As such, NISQ computers cant be trusted to make decisions of major commercial consequence, which means theyre currently used primarily for research and education.

The technology just isnt quite there yet to provide a computational advantage over what could be done with other methods of computation at the moment, said Dohonue. Most [commercial] interest is from a long-term perspective. [Companies] are getting used to the technology so that when it does catch up and that timeline is a subject of fierce debate theyre ready for it.

Also, its fun to sit next to the cool kids. Lets be frank. Its good PR for them, too, said Donohue.

But NISQ computers R&D practicality is demonstrable, if decidedly small-scale. Donohue cites the molecular modeling of lithium hydrogen. Thats a small enough molecule that it can also be simulated using a supercomputer, but the quantum simulation provides an important opportunity to check our answers after a classical-computer simulation. NISQs have also delivered some results for problems in high-energy particle physics, Donohue noted.

One breakthrough came in 2017, when researchers at IBM modeled beryllium hydride, the largest molecule simulated on a quantum computer to date. Another key step arrived in 2019, when IonQ researchers used quantum computing to go bigger still, by simulating a water molecule.

These are generally still small problems that can be checked using classical simulation methods. But its building toward things that will be difficult to check without actually building a large particle physics experiment, which can get very expensive, Donohue said.

And curious minds can get their hands dirty right now. Users can operate small-scale quantum processors via the cloud through IBMs online Q Experience and its open-source software Quiskit. Late last year, Microsoft and Amazon both announced similar platforms, dubbed Azure Quantum and Braket. Thats one of the cool things about quantum computing today, said Krauthamer. We can all get on and play with it.

RelatedQuantum Computing and the Gaming Industry

Quantum computing may still be in its fussy, uncooperative stage, but that hasnt stopped commercial interests from diving in.

IBM announced at the recent Consumer Electronics Show that its so-called Q Network had expanded to more than 100 companies and organizations. Partners now range from Delta Air Lines to Anthem health to Daimler AG, which owns Mercedes-Benz.

Some of those partnerships hinge on quantum computings aforementioned promise in terms of molecular simulation. Daimler, for instance, is hoping the technology will one day yield a way to produce better batteries for electric vehicles.

Elsewhere, partnerships between quantum computing startups and leading companies in the pharmaceutical industry like those established between 1QBit and Biogen, and ProteinQure and AstraZeneca point to quantum molecular modelings drug-discovery promise, distant though it remains. (Today, drug development is done through expensive, relatively low-yield trial-and-error.)

Researchers would need millions of qubits to compute the chemical properties of a novel substance, noted theoretical physicist Sabine Hossenfelder in the Guardian last year. But the conceptual underpinning, at least, is there. A quantum computer knows quantum mechanics already, so I can essentially program in how another quantum system would work and use that to echo the other one, explained Donohue.

Theres also hope that large-scale quantum computers will help accelerate AI, and vice versa although experts disagree on this point. The reason theres controversy is, things have to be redesigned in a quantum world, said Krauthamer, who considers herself an AI-quantum optimist. We cant just translate algorithms from regular computers to quantum computers because the rules are completely different, at the most elemental level.

Some believe quantum computers can help combat climate change by improving carbon capture. Jeremy OBrien, CEO of Palo Alto-based PsiQuantum, wrote last year that quantum simulation of larger molecules if achieved could help build a catalyst for scrubbing carbon dioxide directly from the atmosphere.

Long-term applications tend to dominate headlines, but they also lead us back to quantum computings defining hurdle and the reason coverage remains littered with terms like potential and promise: error correction.

Qubits, it turns out, are higher maintenance than even the most meltdown-prone rock star. Any number of simple actions or variables can send error-prone qubits falling into decoherence, or the loss of a quantum state (mainly that all-important superposition). Things that can cause a quantum computer to crash include measuring qubits and running operations in other words: using it. Even small vibrations and temperature shifts will cause qubits to decohere, too.

Thats why quantum computers are kept isolated, and the ones that run on superconducting circuits the most prominent method, favored by Google and IBM have to be kept at near-absolute zero (a cool -460 degrees Fahrenheit).

Thechallenge is two-fold, according to Jonathan Carter, a scientist at Berkeley Quantum. First, individual physical qubits need to have better fidelity. That would conceivably happen either through better engineering, discovering optimal circuit layout, and finding the optimal combination of components. Second, we have to arrange them to form logical qubits.

Estimates range from hundreds to thousands to tens of thousands of physical qubits required to form one fault-tolerant qubit. I think its safe to say that none of the technology we have at the moment could scale out to those levels, Carter said.

From there, researchers would also have to build ever-more complex systems to handle the increase in qubit fidelity and numbers. So how long will it take until hardware-makers actually achieve the necessary error correction to make quantum computers commercially viable?

Some of these other barriers make it hard to say yes to a five- or 10-year timeline, Carter said.

Donohue invokes and rejects the same figure. Even the optimist wouldnt say its going to happen in the next five to 10 years, he said. At the same time, some small optimization problems, specifically in terms of random number generation could happen very soon.

Weve already seen some useful things in that regard, he said.

For people like Michael Biercuk, founder of quantum-engineering software company Q-CTRL, the only technical commercial milestone that matters now is quantum advantage or, as he uses the term, when a quantum computer provides some time or cost advantage over a classical computer. Count him among the optimists: he foresees a five-to-eight year time scale to achieve such a goal.

Another open question: Which method of quantum computing will become standard? While superconducting has borne the most fruit so far, researchers are exploring alternative methods that involve trapped ions, quantum annealing or so-called topological qubits. In Donohues view, its not necessarily a question of which technology is better so much as one of finding the best approach for different applications. For instance, superconducting chips naturally dovetail with the magnetic field technology that underpins neuroimaging.

The challenges that quantum computing faces, however, arent strictly hardware-related. The magic of quantum computing resides in algorithmic advances, not speed, Greg Kuperberg, a mathematician at the University of California at Davis, is quick to underscore.

If you come up with a new algorithm, for a question that it fits, things can be exponentially faster, he said, using exponential literally, not metaphorically. (There are currently 63 algorithms listed and 420 papers cited at Quantum Algorithm Zoo, an online catalog of quantum algorithms compiled by Microsoft quantum researcher Scott Jordan.)

Another roadblock, according to Krauthamer, is general lack of expertise. Theres just not enough people working at the software level or at the algorithmic level in the field, she said. Tech entrepreneur Jack Hidaritys team set out to count the number of people working in quantum computing and found only about 800 to 850 people, according to Krauthamer. Thats a bigger problem to focus on, even more than the hardware, she said. Because the people will bring that innovation.

While the community underscores the importance of outreach, the term quantum supremacy has itself come under fire. In our view, supremacy has overtones of violence, neocolonialism and racism through its association with white supremacy, 13 researchers wrote in Nature late last year. The letter has kickstarted an ongoing conversation among researchers and academics.

But the fields attempt to attract and expand also comes at a time of uncertainty in terms of broader information-sharing.

Quantum computing research is sometimes framed in the same adversarial terms as conversations about trade and other emerging tech that is, U.S. versus China. An oft-cited statistic from patent analytics consultancy Patinformatics states that, in 2018, China filed 492 patents related to quantum technology, compared to just 248 in the United States. That same year, the think tank Center for a New American Security published a paper that warned, China is positioning itself as a powerhouse in quantum science. By the end of 2018, the U.S. passed and signed into law the National Quantum Initiative Act. Many in the field believe legislators were compelled due to Chinas perceived growing advantage.

The initiative has spurred domestic research the Department of Energy recently announced up to $625 million in funding to establish up to five quantum information research centers but the geopolitical tensions give some in the quantum computing community pause, namely for fear of collaboration-chilling regulation. As quantum technology has become prominent in the media, among other places, there has been a desire suddenly among governments to clamp down, said Biercuk, who has warned of poorly crafted and nationalistic export controls in the past.

What they dont understand often is that quantum technology and quantum information in particular really are deep research activities where open transfer of scientific knowledge is essential, he added.

The National Science Foundation one of the government departments given additional funding and directives under the act generally has a positive track record in terms of avoiding draconian security controls, Kuperberg said. Even still, the antagonistic framing tends to obscure the on-the-ground facts. The truth behind the scenes is that, yes, China would like to be doing good research and quantum computing, but a lot of what theyre doing is just scrambling for any kind of output, he said.

Indeed, the majority of the aforementioned Chinese patents are quantum tech, but not quantum computing tech which is where the real promise lies.

The Department of Energy has an internal list of sensitive technologies that it could potentially restrict DOE researchers from sharing with counterparts in China, Russia, Iran and North Korea. It has not yet implemented that curtailment, however, DOE Office of Science director Chris Fall told the House committee on science, space and technology and clarified to Science, in January.

Along with such multi-agency-focused government spending, theres been a tsunami of venture capital directed toward commercial quantum-computing interests in recent years. A Nature analysis found that, in 2017 and 2018, private funding in the industry hit at least $450 million.

Still, funding concerns linger in some corners. Even as Googles quantum supremacy proof of concept has helped heighten excitement among enterprise investors, Biercuk has also flagged the beginnings of a contraction in investment in the sector.

Even as exceptional cases dominate headlines he points to PsiQuantums recent $230 million venture windfall there are lesser-reported signs of struggle. I know of probably four or five smaller shops that started and closed within about 24 months; others were absorbed by larger organizations because they struggled to raise, he said.

At the same time, signs of at least moderate investor agitation and internal turmoil have emerged. The Wall Street Journal reported in January that much-buzzed quantum computing startup Rigetti Computing saw its CTO and COO, among other staff, depart amid concerns that the companys tech wouldnt be commercially viable in a reasonable time frame.

Investor expectations had become inflated in some instances, according to experts. Some very good teams have faced more investor skepticism than I think has been justified This is not six months to mobile application development, Biercuk said.

In Kuperbergs view, part of the problem is that venture capital and quantum computing operate on completely different timelines. Putting venture capital into this in the hope that some profitable thing would arise quickly, that doesnt seem very natural to me in the first place, he said, adding the caveat that he considers the majority of QC money prestige investment rather than strictly ROI-focused.

But some startups themselves may have had some hand in driving financiers over-optimism. I wont name names, but there definitely were some people giving investors outsize expectations, especially when people started coming up with some pieces of hardware, saying that advantages were right around the corner, said Donohe. That very much rubbed the academic community the wrong way.

Scott Aaronson recently called out two prominent startups for what he described as a sort of calculated equivocation. He wrote of a pattern in which a party will speak of a quantum algorithms promise, without asking whether there are any indications that your approach will ever be able to exploit interference of amplitudes to outperform the best classical algorithm.

And, mea culpa, some blame for the hype surely lies with tech media. Trying to crack an area for a lay audience means you inevitably sacrifice some scientific precision, said Biercuk. (Thanks for understanding.)

Its all led to a willingness to serve up a glass of cold water now and again. As Juani Bermejo-Vega, a physicist and researcher at University of Granada in Spain, recently told Wired, the machine on which Google ran its milestone proof of concept is mostly still a useless quantum computer for practical purposes.

Bermejo-Vegas quote came in a story about the emergence of a Twitter account called Quantum Bullshit Detector, which decrees, @artdecider-like, a bullshit or not bullshit quote tweet of various quantum claims. The fact that leading quantum researchers are among the accounts 9,000-plus base of followers would seem to indicate that some weariness exists among the ranks.

But even with the various challenges, cautious optimism seems to characterize much of the industry. For good and ill, Im vocal about maintaining scientific and technical integrity while also being a true optimist about the field and sharing the excitement that I have and to excite others about whats coming, Biercuk said.

This year could prove to be formative in the quest to use quantum computers to solve real-world problems, said Krauthamer. Whenever I talk to people about quantum computing, without fail, they come away really excited. Even the biggest skeptics who say, Oh no, theyre not real. Its not going to happen for a long time.

Related20 Quantum Computing Companies to Know

Excerpt from:
What Is Quantum Computing and How Does it Work? - Built In

Read More..

IBM Just Called Out Google Over Their "Quantum Computer" – The National Interest Online

On Oct. 23, 2019, Google published a paper in the journal Nature entitled Quantum supremacy using a programmable superconducting processor. The tech giant announced its achievement of a much vaunted goal: quantum supremacy.

This perhaps ill-chosen term (coined by physicist John Preskill) is meant to convey the huge speedup that processors based on quantum-mechanical systems are predicted to exhibit, relative to even the fastest classical computers.

Googles benchmark was achieved on a new type of quantum processor, code-named Sycamore, consisting of 54 independently addressable superconducting junction devices (of which only 53 were working for the demonstration).

Each of these devices allows the storage of one bit of quantum information. In contrast to the bits in a classical computer, which can only store one of two states (0 or 1 in the digital language of binary code), a quantum bit qbit can store information in a coherent superposition state which can be considered to contain fractional amounts of both 0 and 1.

Sycamore uses technology developed by the superconductivity research group of physicist John Martinis at the University of California, Santa Barbara. The entire Sycamore system must be kept cold at cryogenic temperatures using special helium dilution refrigeration technology. Because of the immense challenge involved in keeping such a large system near the absolute zero of temperature, it is a technological tour de force.

Contentious findings

The Google researchers demonstrated that the performance of their quantum processor in sampling the output of a pseudo-random quantum circuit was vastly better than a classical computer chip like the kind in our laptops could achieve. Just how vastly became a point of contention, and the story was not without intrigue.

An inadvertent leak of the Google groups paper on the NASA Technical Reports Server (NTRS) occurred a month prior to publication, during the blackout period when Nature prohibits discussion by the authors regarding as-yet-unpublished papers. The lapse was momentary, but long enough that The Financial Times, The Verge and other outlets picked up the story.

A well-known quantum computing blog by computer scientist Scott Aaronson contained some oblique references to the leak. The reason for this obliqueness became clear when the paper was finally published online and Aaronson could at last reveal himself to be one of the reviewers.

Challenges to Googles story

The story had a further controversial twist when the Google groups claims were immediately countered by IBMs quantum computing group. IBM shared a preprint posted on the ArXiv (an online repository for academic papers that have yet to go through peer review) and a blog post dated Oct. 21, 2019 (note the date!).

While the Google group had claimed that a classical (super)computer would require 10,000 years to simulate the same 53-qbit random quantum circuit sampling task that their Sycamore processor could do in 200 seconds, the IBM researchers showed a method that could reduce the classical computation time to a mere matter of days.

However, the IBM classical computation would have to be carried out on the worlds fastest supercomputer the IBM-developed Summit OLCF-4 at Oak Ridge National Labs in Tennessee with clever use of secondary storage to achieve this benchmark.

While of great interest to researchers like myself working on hardware technologies related to quantum information, and important in terms of establishing academic bragging rights, the IBM-versus-Google aspect of the story is probably less relevant to the general public interested in all things quantum.

For the average citizen, the mere fact that a 53-qbit device could beat the worlds fastest supercomputer (containing more than 10,000 multi-core processors) is undoubtedly impressive. Now we must try to imagine what may come next.

Quantum futures

The reality of quantum computing today is that very impressive strides have been made on the hardware front. A wide array of credible quantum computing hardware platforms now exist, including ion traps, superconducting device arrays similar to those in Googles Sycamore system and isolated electrons trapped in NV-centres in diamond.

These and other systems are all now in play, each with benefits and drawbacks. So far researchers and engineers have been making steady technological progress in developing these different hardware platforms for quantum computing.

What has lagged quite a bit behind are custom-designed algorithms (computer programs) designed to run on quantum computers and able to take full advantage of possible quantum speed-ups. While several notable quantum algorithms exist Shors algorithm for factorization, for example, which has applications in cryptography, and Grovers algorithm, which might prove useful in database search applications the total set of quantum algorithms remains rather small.

Much of the early interest (and funding) in quantum computing was spurred by the possibility of quantum-enabled advances in cryptography and code-breaking. A huge number of online interactions ranging from confidential communications to financial transactions require secure and encrypted messages, and modern cryptography relies on the difficulty of factoring large numbers to achieve this encryption.

Quantum computing could be very disruptive in this space, as Shors algorithm could make code-breaking much faster, while quantum-based encryption methods would allow detection of any eavesdroppers.

The interest various agencies have in unbreakable codes for secure military and financial communications has been a major driver of research in quantum computing. It is worth noting that all these code-making and code-breaking applications of quantum computing ignore to some extent the fact that no system is perfectly secure; there will always be a backdoor, because there will always be a non-quantum human element that can be compromised.

Quantum applications

More appealing for the non-espionage and non-hacker communities in other words, the rest of us are the possible applications of quantum computation to solve very difficult problems that are effectively unsolvable using classical computers.

Ironically, many of these problems emerge when we try to use classical computers to solve quantum-mechanical problems, such as quantum chemistry problems that could be relevant for drug design and various challenges in condensed matter physics including a number related to high-temperature superconductivity.

So where are we in the wonderful and wild world of quantum computation?

In recent years, we have had many convincing demonstrations that qbits can be created, stored, manipulated and read using a number of futuristic-sounding quantum hardware platforms. But the algorithms lag. So while the prospect of quantum computing is fascinating, it will likely be a long time before we have quantum equivalents of the silicon chips that power our versatile modern computing devices.

Michael Bradley, Professor of Physics & Engineering Physics, University of Saskatchewan.This article is republished from The Conversation under a Creative Commons license. Read the original article.

Media: Reuters

Go here to read the rest:
IBM Just Called Out Google Over Their "Quantum Computer" - The National Interest Online

Read More..

Quantum Computing releases its new software application called Mukai – Proactive Investors USA & Canada

Quantum Computing Inc () CEO Robert Liscouski tells Proactive the technology company has released its Mukai quantum application development platform, featuring a software stack ready to solve extremely complex optimization problems.

Liscouski says applications like Mukai are necessary to drive business value, as it ultimately gives access to end-users using quantum computing.

Add related topics to MyProactive

Create your account: sign up and get ahead on news and events

The Company is a publisher. You understand and agree that no content published on the Site constitutes a recommendation that any particular security, portfolio of securities, transaction, or investment strategy is...

In exchange for publishing services rendered by the Company on behalf of Quantum Computing Inc. named herein, including the promotion by the Company of Quantum Computing Inc. in any Content on the Site, the Company...

Original post:
Quantum Computing releases its new software application called Mukai - Proactive Investors USA & Canada

Read More..

Burning Things With Big Lasers In The Name Of Security – Hackaday

Several fields of quantum research have made their transition from research labs into commercial products, accompanied by grandiose claims. Are they as good as they say? We need people like Dr. Sarah Kaiser to independently test those claims, looking for flaws in implementation. At the 2019 Hackaday Superconference she shared her research on attacking commercially available quantum key distribution (QKD) hardware.

Dont be scared away when you see the term quantum in the title. Her talk is very easy to follow along, requiring almost no prior knowledge of quantum research terminology. In fact, thats the point. Dr. Kaisers personal ambition is to make quantum computing an inviting and accessible topic for everyone, not just elite cliques of researchers in ivory towers. You should hear her out in the video below, and by following along with the presentation slide deck (.PPTX).

So why is QKD is so enticing? Unlike existing methods, the theoretical foundation is secure against any attacker constrained by the speed of light and the laws of physics.

Generally speaking, if your attacker is not bound by those things, we have a much bigger problem.

But as we know well, theres always a difference between the theoretical foundation and the actual implementation of cryptography. That difference is where exploits like side-channel attacks thrive, so she started investigating components of a laser QKD system.

As a self-professed Crazy Laser Lady, part of this investigation examined how components held up to big lasers delivering power far outside normal operating range. This turned up exciting effects like a fiber fuse (~17:30 in the video) which is actually a plasma fire propagating through the fiber optic. It looks cool, but its destructive and useless for covert attacks. More productive results came when lasers were used to carefully degrade select components to make the system vulnerable.

If you want to learn more from Dr. Kaiser about quantum key distribution, she has a book chapter on the topic. (Free online access available, but with limitations.) This is not the first attempt to hack quantum key distribution, and we doubt it would be the last. Every generation of products will improve tolerance to attacks, and well need researchers like our Crazy Laser Lady to find the reality behind advertised claims.

Here is the original post:
Burning Things With Big Lasers In The Name Of Security - Hackaday

Read More..