Amex, Accenture, Byjus and others hiring for blockchain developers. Here are the latest job openings – Business Insider India

It is the most sought-after job according to LinkedIn Emerging Jobs 2020 report, followed by artificial intelligence specialist, and javaScript developer.

India is among the top three countries to lead the world in AI skills with robotic process automation, compliance, and integration as the fastest growing skills, the report said.

Every week, Business Insider collates interesting vacancies across marquee organisations. This week we bring job openings for blockchain developers.

Here a few of those opportunities:

Position: Blockchain ArchitectLocation: Bangalore, PuneExperience: Minimum 10 years

Homegrown technology major Wipro is hiring a blockchain architect. The candidate will be required to design and develop solutions, construct networks and facilitate problem solving for blockchain engineering.

To apply for the job, the candidate must have an understanding of Bitcoin and other cryptocurrencies. He should also be aware of the technologies like cryptography, hash functions and encryption and signatures.

Interested candidates can apply here. American Express

Position: Blockchain Engineer

American Express is looking to hire a blockchain engineer. The candidate will be responsible for innovating platform architecture and services - via blockchain technology along with performance testing.

The candidate should be skilled in programming languages like Java, JavaScript and Python. He should have working knowledge of cryptography, API security and consensus algorithms.

Interested candidates can apply here.

Position: Blockchain TechnologiesLocation: BangaloreExperience: 15 yearsEligibility: Experience in blockchain technologies

He will also work on blockchain components of delivery by understanding client requirements.

Interested candidates can apply here.

Position: Blockchain DeveloperLocation: PuneExperience: 4-6 yearsEligibility: Bachelors degree in technical domain

The selected candidate will have to provide workbench delivery for data scientists and artificial intelligence development initiatives.

He should have experience in cryptocurrency and strong knowledge of technologies like ethereum and hyperledger. He should have working knowledge of programming languages like C#, Java, JavaScript along with data structures and algorithms.

Byjus (Think & Learn)

Position: Backend Engineer

Edtech platform Byjus is hiring candidates for its software development team. The candidate will be responsible for building high quality code and testing as per the SDLC (Software Development Life Cycle).

Interested candidates can apply here.

See also:DevOps jobs: Learn these skills to become a Site Reliability Engineer and earn as much as 30 lacs per annum

Learn these 6 technical skills for a career in software development and its more than just programming languages

Link:
Amex, Accenture, Byjus and others hiring for blockchain developers. Here are the latest job openings - Business Insider India

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, dont overlook physical security – Security Boulevard

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. This includes protection from natural disasters, theft, vandalism, and terrorism.

Related: Good to know about IoT

Physical security is often a second thought when it comes to information security. Despite this, physical security must be implemented correctly to prevent attackers from gaining physical access and taking whatever they desire.

This could include expensive hardware, or access to sensitive user and/or enterprise security information. All the encryption, firewalls, cryptography, SCADA systems, and other IT security measures would be useless if that were to occur.

Traditional examples of physical security include junction boxes, feeder pillars, and CCTV security cameras. But the challenges of implementing physical security are much more problematic than they were previously. Laptops, USB drives, and smartphones can all store sensitive data that can be stolen or lost. Organizations have the daunting task of trying to safeguard data and equipment that may contain sensitive information about users.

Companies could face civil or criminal penalties for negligence for not using proper security controls, especially in light of the new General Data Protection Regulation (GDPR). The internet of things (IoT) is widening the sphere of physical security as smart devices connected to business systems via the internet may be located outside of established secure perimeters.

Muthukrishnan

Access control, surveillance, and testing are the three major components that comprise the physical security of a system. Access control is the restricting of access to a system. There are several types of access control methods used. Two of the widely used methods are mechanical access control systems and electronic access control systems.

Surveillance includes monitoring and detecting intruders into the network. The list of intruders can be bought to the knowledge of enterprise through notification systems such as an alarm. The third component testing, must be done to check if the measures taken are correct and reliable.

Physical security is undoubtedly as important as cybersecurity. Analysis should be performed to identify the vulnerable parts of the network. The study should include an envelope of crime reports, natural calamities, weather conditions, and the movement of intruders. These analyses are then forwarded to the administrative control, are prioritized, and then preventive measures can be taken.

The next implementation method is to develop countermeasures to avoid loss of assets. Some of the countermeasures that can be considered are CCTV, alarms, firewalls, exterior lighting, fences, and locks. These barriers should be layered together to significantly reduce the probability of an intruder physically entering the system.

For small scale enterprises, the data center is the most critical part of their IT infrastructure; therefore, guarding and monitoring that space is very crucial. Certain pre-emptive measures should be taken into considerations to provide security to the data. One such measure is to authenticate the users who can access the server. Physical security gates may also help ensure access is only granted to those with sufficient privileges.

Related: The case for quantifying cyber risks

The most important factor that should be taken into account is a security risk assessment. If risks are not properly assessed, providing security becomes tedious. Once a criterion for assessment is formed, a sequence of tests must be done to check the level of security. If the results are not as expected, corrective measures should be performed to ensure that the sufficient security benchmark is reached.

Most organizations tend to focus on more technical aspects of security countermeasures. But remember: all the network intrusion detection systems and firewalls are entirely useless if someone can get to the equipment and steal data or the device.

About the essayist: Vidya Muthukrishnan is an Assistant Professor in the Department of Instrumentation and Control Engineering at the Sri Krishna College of Technology. She has completed her B.Tech Electronics and Instrumentation from SASTRA University and M.Tech in Biomedical Engineering from VIT University Vellore.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from The Last Watchdog authored by bacohido. Read the original post at: https://www.lastwatchdog.com/guest-essay-as-cyber-risks-rise-in-2020-as-they-surely-will-dont-overlook-physical-security/

More here:
GUEST ESSAY: As cyber risks rise in 2020, as they surely will, dont overlook physical security - Security Boulevard

Quantum Cryptography Market Industry Will Be Fiercely Competitive in 2026 – Market Reports Observer

Coherent Market Insights has its own Santa who wishes to offer a DISCOUNT on all its reports. Offer valid until the year changes i.e. 31st December 2019. Hurry, the clock is ticking

What are the global opportunities to develop theQuantum Cryptography market?

The Quantum Cryptography Report uses certain important techniques such as SWOT analysis and Porters Five to examine the data effectively and appropriately.North America, Latin America, Europe, Asia-Pacific, the Middle East and Africa, as well as industry leaders in these regions were examined on the basis of the margin beneficiary and investments.

**Download FREE Sample Copy + Full TOC, Figures and Tables https://www.coherentmarketinsights.com/insight/request-sample/1192

The main players Magiq Technologies, Inc., Quintessencelabs, Nucrypt LLC, Qutools GmbH, Qasky, Crypta Labs Ltd, Qubitekk, Inc., PQ Solutions, Infineon Technologies AG, and Id Quantique

Quantum CryptographyEmerging market growth factors, innovation, industrial chain and 2026 forecast. The report provides an overview of the market, types, applications and major manufacturers, as well as technologies, characteristics and new market chains, trends, expansion.

The Global Market Report provides important data on the global Quantum Cryptography market, as well as key market players.It contains business and market data, progress and capacity in terms of business models and improvements.

The report on theQuantum Cryptographymarketstudyis divided into types and applications intended to assist the industry.This is mainly due to a thorough investigation, which has made it possible to determine the current market situation, in addition to supply prospects.

Market Event Factor Analysis

Market factors

Market challenge

Market trend

And, Get FREE PDF Brochure @ https://www.coherentmarketinsights.com/insight/request-pdf/1192

The scope of theQuantum Cryptography market:

For a better understanding of the market, this report provided a detailed analysis of the drivers, constraints and trends that control the current market scenario as well as the future state of the Quantum Cryptography market during the projected period of 2019-2026 .

While classifying these segments, the team of specialized analysts has listed the relative impact of each segment on the growth of the Quantum Cryptographymarket.Important segment information is needed to recognize the key trends that are convincing the Quantum Cryptography market.

Each market segment offers in-depth information on qualitative and quantitative market analysis.While giving a concise idea of revenue opportunities for all segments, this report also presents the value of opportunities in absolute dollars for all segments during the forecast period from 2019 to 2026.

Finally, the researchers highlight different ways to discover the strengths, weaknesses, opportunities and threats that affect the growth of the Quantum Cryptography market.The feasibility of the new report is also measured in this research report.

Get your special Discount on Direct [emailprotected] https://www.coherentmarketinsights.com/insight/buy-now/1192

Contact Us:If you need more customization, reach us. You can get a point by point of the whole research here. If you have any special requirements, dont mind, let us know and we will offer you the report as you need. Contact Here [emailprotected] ||+1-206-701-6702 (US-UK Toll Free).

This post was originally published on Market Reports Observer

The rest is here:
Quantum Cryptography Market Industry Will Be Fiercely Competitive in 2026 - Market Reports Observer

Quantum Cryptography Market 2020 Segmentation, Top Companies, Applications, Comprehensive Research Report and Forecast to 2026 – Testifyandrecap

The recent report added by Verified Market Research gives a detailed account of the drivers and restraints in the Global Quantum Cryptography market. The research report, titled [Global Quantum Cryptography Market Size and Forecast to 2026] presents a comprehensive take on the overall market. Analysts have carefully evaluated the milestones achieved by the global Quantum Cryptography market and the current trends that are likely to shape its future. Primary and secondary research methodologies have been used to put together an exhaustive report on the subject. Analysts have offered unbiased outlook on the global Quantum Cryptography market to guide clients toward a well-informed business decision.

Global Quantum Cryptography Market was valued at USD 89.75 Million in 2018 and is expected to witness a growth of 35.78% from 2019-2026 and reach USD 1,035.33 Million by 2026.

The comprehensive research report has used Porters five forces analysis and SWOT analysis to give the readers a fair idea of the direction the global Quantum Cryptography market is expected to take. The Porters five forces analysis highlights the intensity of the competitive rivalry while the SWOT analysis focuses on explaining strengths, weaknesses, opportunities, and threats present in the global Quantum Cryptography market. The research report gives an in-depth explanation of the trends and consumer behavior pattern that are likely to govern the evolution of the global Quantum Cryptography market.

Request a Sample Copy of this report @https://www.verifiedmarketresearch.com/download-sample/?rid=6854&utm_source=TFR&utm_medium=009

The following Companies as the Key Players in the Global Quantum Cryptography Market Research Report:

Regions Covered in the Global Quantum Cryptography Market:

Europe (Germany, Russia, UK, Italy, Turkey, France, etc.)

The Middle East and Africa (GCC Countries and Egypt)

North America (United States, Mexico, and Canada)

South America (Brazil etc.)

Asia-Pacific (China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)

The scope of the Report:

The research report on global Quantum Cryptography market includes segmentation on the basis of technology, application, end users, and region. Each segmentation is a chapter, which explains relevant components. The chapters include graphs to explain the year-on-year progress and the segment-specific drivers and restraints. In addition, the report also provides the government outlooks within the regional markets that are impacting the global Quantum Cryptography market.

Lastly, Verified Market Researchs report on Quantum Cryptography market includes a detailed chapter on the company profiles. This chapter studies the key players in the global Quantum Cryptography market. It mentions the key products and services of the companies along with an explanation of the strategic initiatives. An overall analysis of the strategic initiatives of the companies indicates the trends they are likely to follow, their research and development statuses, and their financial outlooks. The report intends to give the readers a comprehensive point of view about the direction the global Quantum Cryptography market is expected to take.

Ask for Discount @https://www.verifiedmarketresearch.com/ask-for-discount/?rid=6854&utm_source=TFR&utm_medium=009

Table of Content

1 Introduction of Quantum Cryptography Market

1.1 Overview of the Market 1.2 Scope of Report 1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining 3.2 Validation 3.3 Primary Interviews 3.4 List of Data Sources

4 Quantum Cryptography Market Outlook

4.1 Overview 4.2 Market Dynamics 4.2.1 Drivers 4.2.2 Restraints 4.2.3 Opportunities 4.3 Porters Five Force Model 4.4 Value Chain Analysis

5 Quantum Cryptography Market, By Deployment Model

5.1 Overview

6 Quantum Cryptography Market, By Solution

6.1 Overview

7 Quantum Cryptography Market, By Vertical

7.1 Overview

8 Quantum Cryptography Market, By Geography

8.1 Overview 8.2 North America 8.2.1 U.S. 8.2.2 Canada 8.2.3 Mexico 8.3 Europe 8.3.1 Germany 8.3.2 U.K. 8.3.3 France 8.3.4 Rest of Europe 8.4 Asia Pacific 8.4.1 China 8.4.2 Japan 8.4.3 India 8.4.4 Rest of Asia Pacific 8.5 Rest of the World 8.5.1 Latin America 8.5.2 Middle East

9 Quantum Cryptography Market Competitive Landscape

9.1 Overview 9.2 Company Market Ranking 9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview 10.1.2 Financial Performance 10.1.3 Product Outlook 10.1.4 Key Developments

11 Appendix

11.1 Related Research

Request Customization of Report @ https://www.verifiedmarketresearch.com/product/global-quantum-cryptography-market-size-and-forecast-to-2026/?utm_source=TFR&utm_medium=009

We also offer customization on reports based on specific client requirement:

1- Free country level analysis for any 5 countries of your choice.

2- Free Competitive analysis of any market players.

3- Free 40 analyst hours to cover any other data points

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne Fernandes Call: +1 (650) 781 4080 Email: [emailprotected]

Continued here:
Quantum Cryptography Market 2020 Segmentation, Top Companies, Applications, Comprehensive Research Report and Forecast to 2026 - Testifyandrecap

No, The World Is Not Headed Into A Quantum Computing Future – The National Interest Online

Key point:The mathematics that underpin quantum algorithms is well established, but there are daunting engineering challenges that remain.

Google announced this fall to much fanfare that it had demonstrated quantum supremacy that is, it performed a specific quantum computation far faster than the best classical computers could achieve. IBM promptly critiqued the claim, saying that its own classical supercomputer could perform the computation at nearly the same speed with far greater fidelity and, therefore, the Google announcement should be taken with a large dose of skepticism.

This wasnt the first time someone cast doubt on quantum computing. Last year, Michel Dyakonov, a theoretical physicist at the University of Montpellier in France, offered a slew of technical reasons why practical quantum supercomputers will never be built in an article in IEEE Spectrum, the flagship journal of electrical and computer engineering.

So how can you make sense of what is going on?

As someone who has worked on quantum computing for many years, I believe that due to the inevitability of random errors in the hardware, useful quantum computers are unlikely to ever be built.

Whats a quantum computer?

To understand why, you need to understand how quantum computers work since theyre fundamentally different from classical computers.

A classical computer uses 0s and 1s to store data. These numbers could be voltages on different points in a circuit. But a quantum computer works on quantum bits, also known as qubits. You can picture them as waves that are associated with amplitude and phase.

Qubits have special properties: They can exist in superposition, where they are both 0 and 1 at the same time, and they may be entangled so they share physical properties even though they may be separated by large distances. Its a behavior that does not exist in the world of classical physics. The superposition vanishes when the experimenter interacts with the quantum state.

Due to superposition, a quantum computer with 100 qubits can represent 2100 solutions simultaneously. For certain problems, this exponential parallelism can be harnessed to create a tremendous speed advantage. Some code-breaking problems could be solved exponentially faster on a quantum machine, for example.

There is another, narrower approach to quantum computing called quantum annealing, where qubits are used to speed up optimization problems. D-Wave Systems, based in Canada, has built optimization systems that use qubits for this purpose, but critics also claim that these systems are no better than classical computers.

Regardless, companies and countries are investing massive amounts of money in quantum computing. China has developed a new quantum research facility worth US$10 billion, while the European Union has developed a 1 billion ($1.1 billion) quantum master plan. The United States National Quantum Initiative Act provides $1.2 billion to promote quantum information science over a five-year period.

Breaking encryption algorithms is a powerful motivating factor for many countries if they could do it successfully, it would give them an enormous intelligence advantage. But these investments are also promoting fundamental research in physics.

Many companies are pushing to build quantum computers, including Intel and Microsoft in addition to Google and IBM. These companies are trying to build hardware that replicates the circuit model of classical computers. However, current experimental systems have less than 100 qubits. To achieve useful computational performance, you probably need machines with hundreds of thousands of qubits.

Noise and error correction

The mathematics that underpin quantum algorithms is well established, but there are daunting engineering challenges that remain.

For computers to function properly, they must correct all small random errors. In a quantum computer, such errors arise from the non-ideal circuit elements and the interaction of the qubits with the environment around them. For these reasons the qubits can lose coherency in a fraction of a second and, therefore, the computation must be completed in even less time. If random errors which are inevitable in any physical system are not corrected, the computers results will be worthless.

In classical computers, small noise is corrected by taking advantage of a concept known as thresholding. It works like the rounding of numbers. Thus, in the transmission of integers where it is known that the error is less than 0.5, if what is received is 3.45, the received value can be corrected to 3.

Further errors can be corrected by introducing redundancy. Thus if 0 and 1 are transmitted as 000 and 111, then at most one bit-error during transmission can be corrected easily: A received 001 would be a interpreted as 0, and a received 101 would be interpreted as 1.

Quantum error correction codes are a generalization of the classical ones, but there are crucial differences. For one, the unknown qubits cannot be copied to incorporate redundancy as an error correction technique. Furthermore, errors present within the incoming data before the error-correction coding is introduced cannot be corrected.

Quantum cryptography

While the problem of noise is a serious challenge in the implementation of quantum computers, it isnt so in quantum cryptography, where people are dealing with single qubits, for single qubits can remain isolated from the environment for significant amount of time. Using quantum cryptography, two users can exchange the very large numbers known as keys, which secure data, without anyone able to break the key exchange system. Such key exchange could help secure communications between satellites and naval ships. But the actual encryption algorithm used after the key is exchanged remains classical, and therefore the encryption is theoretically no stronger than classical methods.

Quantum cryptography is being commercially used in a limited sense for high-value banking transactions. But because the two parties must be authenticated using classical protocols, and since a chain is only as strong as its weakest link, its not that different from existing systems. Banks are still using a classical-based authentication process, which itself could be used to exchange keys without loss of overall security.

Quantum cryptography technology must shift its focus to quantum transmission of information if its going to become significantly more secure than existing cryptography techniques.

Commercial-scale quantum computing challenges

While quantum cryptography holds some promise if the problems of quantum transmission can be solved, I doubt the same holds true for generalized quantum computing. Error-correction, which is fundamental to a multi-purpose computer, is such a significant challenge in quantum computers that I dont believe theyll ever be built at a commercial scale.

[ Youre smart and curious about the world. So are The Conversations authors and editors. You can get our highlights each weekend. ]

Subhash Kak, Regents Professor of Electrical and Computer Engineering, Oklahoma State University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

This article was first published earlier this month.

Image: Reuters

More here:
No, The World Is Not Headed Into A Quantum Computing Future - The National Interest Online

The 12 Most Important and Stunning Quantum Experiments of 2019 – Livescience.com

The smallest scale events have giant consequences. And no field of science demonstrates that better than quantum physics, which explores the strange behaviors of mostly very small things. In 2019, quantum experiments went to new and even stranger places and practical quantum computing inched ever closer to reality, despite some controversies. These were the most important and surprising quantum events of 2019.

If one quantum news item from 2019 makes the history books, it will probably be a big announcement that came from Google: The tech company announced that it had achieved "quantum supremacy." That's a fancy way of saying that Google had built a computer that could perform certain tasks faster than any classical computer could. (The category of classical computers includes any machine that relies on regular old 1s and 0s, such as the device you're using to read this article.)

Google's quantum supremacy claim, if borne out, would mark an inflection point in the history of computing. Quantum computers rely on strange small-scale physical effects like entanglement, as well as certain basic uncertainties in the nano-universe, to perform their calculations. In theory, that quality gives these machines certain advantages over classical computers. They can easily break classical encryption schemes, send perfectly encrypted messages, run some simulations faster than classical computers can and generally solve hard problems very easily. The difficulty is that no one's ever made a quantum computer fast enough to take advantage of those theoretical advantages or at least no one had, until Google's feat this year.

Not everyone buys the tech company's supremacy claim though. Subhash Kak, a quantum skeptic and researcher at Oklahoma State University, laid out several of the reasons in this article for Live Science.

Read more about Google's achievement of quantum supremacy.

Another 2019 quantum inflection point came from the world of weights and measures. The standard kilogram, the physical object that defined the unit of mass for all measurements, had long been a 130-year-old, platinum-iridium cylinder weighing 2.2 lbs. and sitting in a room in France. That changed this year.

The old kilo was pretty good, barely changing mass over the decades. But the new kilo is perfect: Based on the fundamental relationship between mass and energy, as well as a quirk in the behavior of energy at quantum scales, physicists were able to arrive at a definition of the kilogram that won't change at all between this year and the end of the universe.

Read more about the perfect kilogram.

A team of physicists designed a quantum experiment that showed that facts actually change depending on your perspective on the situation. Physicists performed a sort of "coin toss" using photons in a tiny quantum computer, finding that the results were different at different detectors, depending on their perspectives.

"We show that, in the micro-world of atoms and particles that is governed by the strange rules of quantum mechanics, two different observers are entitled to their own facts," the experimentalists wrote in an article for Live Science. "In other words, according to our best theory of the building blocks of nature itself, facts can actually be subjective."

Read more about the lack of objective reality.

For the first time, physicists made a photograph of the phenomenon Albert Einstein described as "spooky action at a distance," in which two particles remain physically linked despite being separated across distances. This feature of the quantum world had long been experimentally verified, but this was the first time anyone got to see it.

Read more about the unforgettable image of entanglement.

In some ways the conceptual opposite of entanglement, quantum superposition is enables a single object to be in two (or more) places at once, a consequence of matter existing as both particles and waves. Typically, this is achieved with tiny particles like electrons.

But in a 2019 experiment, physicists managed to pull off superposition at the largest scale ever: using hulking, 2,000-atom molecules from the world of medical science known as "oligo-tetraphenylporphyrins enriched with fluoroalkylsulfanyl chains."

Read about the macro-scale achievement of superposition.

Under normal circumstances, heat can cross a vacuum in only one manner: in the form of radiation. (That's what you're feeling when the sun's rays cross space to beat on your face on a summer day.) Otherwise, in standard physical models, heat moves in two manners: First, energized particles can knock into other particles and transfer their energy. (Wrap your hands around a warm cup of tea to feel this effect.) Second, a warm fluid can displace a colder fluid. (That's what happens when you turn the heater on in your car, flooding the interior with warm air.) So without radiation, heat can't cross a vacuum.

But quantum physics, as usual, breaks the rules. In a 2019 experiment, physicists took advantage of the fact that at the quantum scale, vacuums aren't truly empty. Instead, they're full of tiny, random fluctuations that pop into and out of existence. At a small enough scale, the researchers found, heat can cross a vacuum by jumping from one fluctuation to the next across the apparently empty space.

Read more about heat leaping across the quantum vacuum of space.

This next finding is far from an experimentally verified discovery, and it's even well outside the realm of traditional quantum physics. But researchers working with quantum gravity a theoretical construct designed to unify the worlds of quantum mechanics and Einstein's general relativity showed that under certain circumstances an event might cause an effect that occurred earlier in time.

Certain very heavy objects can influence the flow of time in their immediate vicinity due to general relativity. We know this is true. And quantum superposition dictates that objects can be in multiple places at once. Put a very heavy object (like a big planet) in a state of quantum superposition, the researchers wrote, and you can design oddball scenarios where cause and effect take place in the wrong order.

Read more about cause and effect reversing.

Physicists have long known about a strange effect known as "quantum tunneling," in which particles seem to pass through seemingly impassable barriers. It's not because they're so small that they find holes, though. In 2019, an experiment showed how this really happens.

Quantum physics says that particles are also waves, and you can think of those waves as probability projections for the location of the particle. But they're still waves. Smash a wave against a barrier in the ocean, and it will lose some energy, but a smaller wave will appear on the other side. A similar effect occurs in the quantum world, the researchers found. And as long as there's a bit of probability wave left on the far side of the barrier, the particle has a chance of making it through the obstruction, tunneling through a space where it seems it should not fit.

Read more about the amazing quantum tunneling effect.

This was a big year for ultra-high-pressure physics. And one of the boldest claims came from a French laboratory, which announced that it had created a holy grail substance for materials science: metallic hydrogen. Under high enough pressures, such as those thought to exist at the core of Jupiter, single-proton hydrogen atoms are thought to act as an alkali metal. But no one had ever managed to generate pressures high enough to demonstrate the effect in a lab before. This year, the team said they'd seen it at 425 gigapascals (4.2 million times Earth's atmospheric pressure at sea level). Not everyone buys that claim, however.

Read more about metallic hydrogen.

Zap a mass of supercooled atoms with a magnetic field, and you'll see "quantum fireworks": jets of atoms firing off in apparently random directions. Researchers suspected there might be a pattern in the fireworks, but it wasn't obvious just from looking. With the aid of a computer, though, researchers discovered a shape to the fireworks effect: a quantum turtle. No one's yet sure why it takes that shape, however.

Read more about the quantum turtle.

Time's supposed to move in only one direction: forward. Spill some milk on the ground, and there's no way to perfectly dry out the dirt and return that same clean milk back into the cup. A spreading quantum wave function doesn't unspread.

Except in this case, it did. Using a tiny, two-qubit quantum computer, physicists were able to write an algorithm that could return every ripple of a wave to the particle that created it unwinding the event and effectively turning back the arrow of time.

Read more about reversing time's arrow.

A nice feature of quantum computers, which rely on superpositions rather than 1s and 0s, is their ability to play out multiple calculations at once. That advantage is on full display in a new quantum prediction engine developed in 2019. Simulating a series of connected events, the researchers behind the engine were able to encode 16 possible futures into a single photon in their engine. Now that's multitasking!

Read more about the 16 possible futures.

Originally published on Live Science.

Read more from the original source:

The 12 Most Important and Stunning Quantum Experiments of 2019 - Livescience.com

Physicists Just Achieved The First-Ever Quantum Teleportation Between Computer Chips – ScienceAlert

As 2019 winds to a close, the journey towards fully realised quantum computing continues: physicists have been able to demonstrate quantum teleportation between two computer chips for the first time.

Put simply, this breakthrough means that information was passed between the chips not by physical electronic connections, but through quantum entanglement by linking two particles across a gap using the principles of quantum physics.

We don't yet understand everything about quantum entanglement (it's the same phenomenon Albert Einstein famously called "spooky action"), but being able to use it to send information between computer chips is significant, even if so far we're confined to a tightly controlled lab environment.

"We were able to demonstrate a high-quality entanglement link across two chips in the lab, where photons on either chip share a single quantum state," explains quantum physicist Dan Llewellynfrom the University of Bristol in the UK.

"Each chip was then fully programmed to perform a range of demonstrations which utilise the entanglement."

Hypothetically, quantum entanglement can work over any distance. Two particles get inextricably linked together, which means looking at one tells us something about the other, wherever it is (in this case, on a separate computer chip).

To achieve their result, the team generated pairs of entangled photons, encoding quantum information in a way that ensured low levels of interference and high levels of accuracy. Up to four qubits the quantum equivalent of classical computing bits were linked together.

"The flagship demonstration was a two-chip teleportation experiment, whereby the individual quantum state of a particle is transmitted across the two chips after a quantum measurement is performed," says Llewellyn.

"This measurement utilises the strange behaviour of quantum physics, which simultaneously collapses the entanglement link and transfers the particle state to another particle already on the receiver chip."

The researchers were then able to run experiments in which the fidelity reached 91 percent as in, almost all the information was accurately transmitted and logged.

Scientists are learning more and more about how quantum entanglement works, but for now it's very hard to control. It's not something you can install inside a laptop: you need a lot of bulky, expensive scientific equipment to get it working.

But the hope is that advances in the lab, such as this one, might one day lead to advances in computing that everyone can take advantage of super-powerful processing power and a next-level internet with built-in hacking protections.

The low data loss and high stability of the teleportation, as well as the high level of control that the scientists were able to get over their experiments, are all promising signs in terms of follow-up research.

It's also a useful study for efforts to get quantum physics working with the silicon chip (Si-chip) tech used in today's computers, and the complementary metal-oxide-semiconductor (CMOS) techniques used to make those chips.

"In the future, a single Si-chip integration of quantum photonic devices and classical electronic controls will open the door for fully chip-based CMOS-compatible quantum communication and information processing networks," says quantum physicist Jianwei Wang, from Peking University in China.

The research has been published in Nature Physics.

Here is the original post:

Physicists Just Achieved The First-Ever Quantum Teleportation Between Computer Chips - ScienceAlert

Quantum Supremacy and the Regulation of Quantum Technologies – The Regulatory Review

Advancing technology requires regulators to act quickly to develop standards and defenses against cyberattacks.

After a false-start in September, Google provided the first peer-reviewed evidence of quantum supremacy a month later in the prestigious journal Nature. The announcement was the latest crescendo in the development of quantum computersemerging technologies that can efficiently solve complicated computational problems with hardware that takes advantage of quantum mechanics.

With data privacy and national security at stake, agile and adaptive regulatory strategies are needed to manage the risks of fast-approaching quantum computers without thwarting their potential benefits.

Although classical computers use binary bits to perform calculations, devices under development, like Googles, use qubits that are not limited to 1s and 0s when they process information. Instead, through phenomena like superposition and entanglement, groups of qubits can have exponentially more power by not merely being on or off, but also being some blend of on and off at the same time. With the right programming and hardware design, quantum computers should be able to work smarter than classical computers when making sense of large datasets.

Demonstrating that a quantum computer can actually solve problems even supercomputers cannot handleso called quantum supremacy (or, preferably, the less violent quantum advantage)has long been an envied goal in the quantum engineering field. But, as the CEO of leading quantum technology firm Rigetti noted, practical quantum devices will create new risks and could lead to unanticipated policy challenges.

Setting risks aside, quantum technologies do promise exciting near-term benefits. Quantum advantage highlights the raw power of these devices to work with big datasets and could be used to advance drug discovery, business analytics, artificial intelligence, traffic control, and more. Although IBM has moved to cast doubt on the achievement, Googles publication claims the team is only one creative algorithm away from valuable near-term applications. The world could almost be at the dawn of an era of quantum computers with day-to-day applications.

But practical quantum computers could also rip through current cybersecurity infrastructure. The abilities of these emerging technologies create significant national security concerns, both in the United States and for other countries investing heavily in quantum technologies, such as China.

Quantum cyberattacks could also put private or sensitive information at risk or expose corporate intellectual property and trade secrets.

To be sure, one developer showing quantum advantage for a single task does not mean the quantum cyberattacks will start tomorrow, so panic should be avoided. But, despite the hype, attaining quantum advantage does signal an approaching time when these attacks could become possible.

Achieving quantum advantage or supremacy is bittersweet, then, given the potential for both benefit and harm. Even though this is the first report of the achievement in the United States, it is not impossible that this goal has been reached elsewhere or will be soon. With this understanding, what should the regulatory and policy responses look like to manage novel risks while still encouraging benefits?

Three strategies can help prepare for the coming wave of quantum computers without undermining innovation, drawing on technical standards and codes of conduct as regulatory tools.

First, private standards will be useful for responding to quantum concerns. These voluntary, technical standards can give government and industry a common language to speak by creating agreed-upon definitions and ways of measuring quantum computers performance capabilities. Technical standards can therefore facilitate policy conversations about how powerful quantum computers really are and what types of risks are realistic and deserve policymakers attention.

The Institute of Electrical and Electronics Engineers Standards Association (IEEE) is currently working on setting standards for terminology and performance metrics in quantum computing. Given the global authority and reputation of IEEE, these standards could become quite influential when adopted and even be helpful for industry. To get ahead of potential quantum cyberattacks, experts from government, industry, academia, and NGOs should participate in standardization efforts to accelerate this work and add different perspectives to make standards more comprehensive and inclusive.

Second, the quantum computing industry itself can be proactive even without government taking the lead. I argue in a recent paper that, to guide responsible development of these powerful new technologies, quantum computing companies could create codes of conduct todetail best practices and principles for the responsible deployment of quantum computing.

Codes of conduct can show that an emerging industry is trying to be responsible and transparent while publicly setting expectations for good behavior. With concerns that quantum computers might be used for nefarious purposes or fall into the wrong hands, the industry should respond by committing to act responsibly through quantum codesand have a chance to help define what responsibility means in this new area as an added benefit.

Finally, the industry should work to support the development of standards for another technology intended to defend from quantum cyberattacks, called post-quantum cryptography. Quantum computers excel at solving problems that require factoring large numbers, which gets right to the heart of current cybersecurity methods. Post-quantum cryptography tries to counter this strength by creating new types of encryption that quantum computers will be less adept at cracking.

Post-quantum methods still must be fully developed, standardized, and then implemented in critical networkscreating a need for policy and governance efforts to facilitate the transition to a post-quantum world. The National Institute of Standards and Technology has begun to work on post-quantum standards, but these efforts will not finish overnight. The potential urgency of practical quantum computers means that work to standardize and advance post-quantum cryptographic methods deserves greater attention and resources from both the public and private sectors, as well as expert groups and non-governmental organizations.

Googles announcement that it has reached quantum advantage or supremacy is a great achievement in the long push to develop pragmatic quantum computers that can benefit society. But even though this announcement does not mean cybersecurity ends tomorrow, the security and privacy risks of quantum computers deserve policymakers prompt attention.

Responding to these challenges with public and private standards and codes of conduct should promote responsibility, security, and growth in the development of emerging quantum technologies.

Walter G. Johnson, a J.D. candidate and research assistant at the Sandra Day OConnor College of Law at Arizona State University, where he also holds a masters degree in science and technology policy.

Continued here:

Quantum Supremacy and the Regulation of Quantum Technologies - The Regulatory Review

5 open source innovation predictions for the 2020s – TechRepublic

IBM's CTO of Open Technology also looks back at the innovations of the past decade.

Open source played a significant role in software development over the past decade from containers to microservices, blockchain and serverless.

Chris Ferris, chief technology officer of Open Technology at IBM, discusses some of the open source trends from the past decade and what to expect in 2020 and beyond.

SEE: Deploying containers: Six critical concepts (TechRepublic)

The concepts of containers and microservices were merely concepts before 2010, Ferris said. Then Docker launched in 2013, planting the early seeds of the container industry.

At the same time, microservices and the technologies to make them possible were borne in open source through the Netflix OSS project.

Docker went on to become one of the most influential technologies of the 2010s, giving rise to a myriad of new open source projects, including Kubernetes, which launched in 2015.

Today, he noted, Kubernetes is the largest open source project on the planet. Companies are using the platform to transform monolithic application architectures, embracing containerized microservices that are supported by service mesh capabilities of projects such as Istio.

"In the next decade, we anticipate that open source projects such as Istio, Kubernetes and OKD will focus on making containers and microservices smaller and faster to serve the needs of cloud-native development and to reduce the container's attack surface," Ferris said.

OKD is the open source version of Red Hat's OpenShift platform. "Keep an eye on unikernels (executable images that contain system libraries, a language runtime, and necessary applications), which may also gain traction thanks to the open source communities around them."

AWS Lambda was released in 2014 and put all the PaaS services on notice. Lambda's release was followed by IBM OpenWhisk (which became Apache OpenWhisk), among others, in 2016. Both open source, distributed serverless platforms execute functions in response to events at any scale, Ferris said.

Kubernetes gained prominence in the latter part of the decade, fueling the desire to extend Kubernetes with capabilities that would enable serverless. This gave rise to Knative in 2018. Now Knative has split into multiple open source projects including Tekton, each with their own set of innovations, he said.

In the next few years, Ferris said we can expect to see containers get smaller, faster. "The potential exists to have an environment that can run containers at very little cost, instantaneously,'' pushing the boundaries of serverless platforms, he said.

IBM Watson made a huge splash when it appeared on "Jeopardy!" in 2011, bringing artificial intelligence into the mainstream. Now, Ferris noted, AI is part of our everyday lives and we interact with Siri and Alexa daily, talk with customer service chatbots regularly, use facial recognition to unlock our gadgets, and are nearing the advent of fully autonomous self-driving cars.

AI and machine learning have powered these innovations and many of the AI advancements came about thanks to open source projects such as TensorFlow and PyTorch, which launched in 2015 and 2016, respectively.

In the next decade, Ferris stressed the importance of not just making AI smarter and more accessible, but also more trustworthy. This will ensure that AI systems make decisions in a fair manner, aren't vulnerable to tampering, and can be explained, he said.

Open source is the key for building this trust into AI. Projects like the Adversarial Robustness 360 Toolkit, AI Fairness 360 Open Source Toolkit, and AI Explainability 360 Open Source Toolkit were created to ensure that trust is built into these systems from the beginning, he said.

Expect to see these projects and others from the Linux Foundation AI such as the ONNX project drive the significant innovation related to trusted AI in the future. The Linux Foundation AI provides a vendor-neutral interchange format for deep learning and machine learning.

In 2008, the pseudonymous Satoshi Nakamoto published his now famous paper on bitcoin, which introduced the concept of a blockchain network, whose purpose was to be a decentralized cryptocurrency platform.

That innovation made people start to wonder about different ways that the blockchain concepts and technology might be applied in non-cryptocurrency use cases in asset management, supply chains, healthcare, and identity, among others, Ferris said.

In 2015, IBM contributed its Open Blockchain project to the newly established Hyperledger organization, founded to develop open source blockchain technology for the enterprise. That contribution launched what has arguably become one of the two or three most popular blockchain frameworks: Hyperledger Fabric, he said.

While blockchain's initial uses were confined to cryptocurrency, open source engagement around Hyperledger and Ethereum has expanded the possibilities for how this technology is used.

In the enterprise, different approaches are being explored not only to enhance privacy but also to build a collection of nodes required to achieve confirmation on a transaction with trust almost all in open source, he said.

There has been lots of buzz around the promise of quantum computing, and although an app with a "quantum advantage" hasn't been developed yet, the ability for developers to start using quantum processors is growing and will continue to evolve in the next decade, Ferris said.

IBM's open source Qiskit software framework, released in 2016, lets developers code in Python on real quantum hardware for systems around research, education, business, and even games.

"The possibilities for how quantum computing will solve problems and interact with today's technology seem endless quantum computing could impact a wide range of domains, such as chemistry, finance, artificial intelligence, and others," he said.For that to happen will require a "significant hardware environment," Ferris said.

Open source is the best mechanism to bring about these changes, he maintained. That is what spawned ideas like microsystems, which grew out of the virtualization space, and Knative from Kubernetes.

"That wouldn't have happened in the closed source space, so it's a matter of everyone building up on everyone else's successes and someone coming along and saying, 'Here's a better idea,'" he said.

Working together, developers have the power to change entire industries, Ferris believes. "I can't think of anything that's been developed exclusively in closed source that didn't eventually come out in open source."

You don't want to miss our tips, tutorials, and commentary on the Linux OS and open source applications. Delivered Tuesdays

Image: Ildo Frazao, Getty Images/iStockphoto

Read the original here:

5 open source innovation predictions for the 2020s - TechRepublic

20 technologies that could change your life in the next decade – Economic Times

The decade thats knocking on our doors now the 2020s is likely to be a time when science fiction manifests itself in our homes and roads and skies as viable, everyday technologies. Cars that can drive themselves. Meat that is derived from plants. Robots that can be fantastic companions both in bed and outside.

Implanting kidneys that can be 3-D printed using your own biomaterial. Using gene editing to eradicate diseases, increase crop yield or fix genetic disorders in human beings. Inserting a swarm of nanobots that can cruise through your blood stream and monitor parameters or unblock arteries. Zipping between Delhi and New York on a hypersonic jet. All of this is likely to become possible or substantially closer to becoming a reality in the next 10 years.

Ideas that have been the staple of science fiction for decades artificial intelligence, universal translators, sex robots, autonomous cars, gene editing and quantum computing are at the cusp of maturity now. Many are ready to move out of labs and enter the mainstream. Expect the next decade to witness breakout years for the world of technology.

Read on:

The 2020s: A new decade promising miraculous tech innovations

Universal translators: End of language barrier

Climate interventions: Clearing the air from carbon

Personalised learning: Pedagogy gets a reboot with AI

Made in a Printer: 3-D printing going to be a new reality

Digital money: End of cash is near, cashless currencies are in vogue

Singularity: An era where machines will out-think human

Mach militaries: Redefining warfare in the 2020

5G & Beyond: Ushering a truly connected world

Technology: Solving the problem of clean water

Quantum computing : Beyond the power of classical computing

Nanotechnology: From science fiction to reality

Power Saver: Energy-storage may be the key to maximise power generation

Secret code: Gene editing could prove to be a game-changer

Love in the time of Robots: The rise of sexbots and artificial human beings

Wheels of the future: Flying cars, hyperloops and e-highways will transform how people travel

New skies, old fears: The good, bad& ugly of drones

Artificial creativity: Computer programs could soon churn out books, movies and music

Meat alternatives: Alternative meat market is expected to grow 10 times by 2029

Intelligent robots & cyborg warriors will lead the charge in battle

Why we first need to focus on the ethical challenges of artificial intelligence

It's time to reflect honestly on our motivations for innovation

India's vital role in new space age

Plastic waste: Environment-friendly packaging technologies will gain traction

Original post:

20 technologies that could change your life in the next decade - Economic Times