R eykjavik University Ne w Technology Spring 2006

Size: px
Start display at page:

Download "R eykjavik University Ne w Technology Spring 2006"

Transcription

1 R eykjavik University Ne w Technology Spring 2006 Students March 19th 2006 Guðmundur Már Einarsson Hlynur Tryggvason

2 Table of Contents Introduction... 3 Basics of quantum computing... 3 Origins of quantum computing... 5 Recent advancements in quantum computing... 5 Current problems in quantum computing... 6 How does this technology relate to Moore s Law?... 7 Potential impact on software design and programming... 9 Potential impact on daily life... 9 Security issues...10 Searching...11 Business...11 Accessibility...11 Disruptive technology...12 Conclusion...12 References...13 Appendicies...15 Appendix A: to/from Charles Ross - former Secretary of the Quantum Computers in Europe Pathfinder Project Appendix B: to/from George I. Bourianoff senior program manager in the Strategic Research group at Intel

3 Introduction Moore s Law states that the power of microprocessors will double every 18 months. This has been valid for at least last 40 years and if it continues to hold, then today s chip manufacturing techniques will exhaust their capabilities by the year 2020, when a transistor would become no larger than the size of an atom. So the need for a new technology in building computers is clear if we are going to keep up with Moore s Law after 10 to 15 years. Enter quantum computing, potentially the next step of computer evolution. Functional quantum computer is a realistic option that could be available after 10 years or so. Quantum computers have the potential to become so powerful that problems which take today s computers years to solve would take minutes for a quantum computer. In this paper we look at the origins of quantum computing, see how they differ from todays computers and look at current problems in the field. Then we look at how quantum computers could extend Moore s Law and finally at the huge impact quantum computers could have if they would exist. For example, if one quantum computer would be available today, no information on the internet would be safe. Basics of quantum computing Almost every computer today is based on the Turing machine, developed by Alan Turing in the 1930s. The Turing machine consists of a tape of unlimited length that is divided into little squares where each square can hold one bit (0 or 1) or be left blank. A readwrite device reads these symbols and blanks which gives the machine its instructions. In a quantum turing machine the difference is that the tape and the read-write head exist in a quantum state, which means that each square can now hold one qubit which is either 0 or 1 or a superposition of 0 and 1 (being in a superposition basically means that the qubit can hold multiple values at the same time). Figure 1: Classical and Quantum Registers: (a) A comparison of a classical bit and a quantum bit. (b) Superposition states allow quantum registers to store all possible values simultaneously. [12] 3

4 Roughly speaking, a computer with N qubits has the processing power equivalent to a classical computer with 2 N classic bits. The table on the right might give some sense of the computing power a quantum computer might provide. Just to put things in perspective, if we would have a quantum computer with 300 qubits, then we would have states, approx. the same number of atoms in the known universe. [12] Qubits Equivalent Classic bits (2 Qubits ) = 8 KB = 512 MB Since each qubit can hold multiple values, it follows that a quantum computer can work on multiple computations at the same time, which gives us native parallelism. But now you must be thinking: I can listen to music, download movie trailers and work on my thesis at the same time on my computer, is this not parallelism?. It is a form of parallelism, but it is not native. Classic computers have gotten very powerful and are able to effectively simulate parallelism. But the fact remains that each processor (or each processor core if the processor has multiple cores) can only work on one computation at the same time. With quantum computers, it would essentially be possible to create a new processor for each application, process or thread that would require it. Although quantum computers have the potential of becoming a lot faster than Turingbased computers, they can be simulated using a Turing machine (given an unpractical amount of time and memory). This means that quantum computers cannot solve any problem that a Turing machine can t, such as the infamous halting problem [2]. Figure 2: Hypothetical high-level view of a quantum processor. [16] 4

5 Origins of quantum computing We don t have to go far back to find the origins of quantum computing. While computers have been around for the majority of the 20th century, quantum computing was first theorized just 20 years ago, by a physicist at the Argonne National Laboratory. [1] The idea of quantum computing came to be when scientist predicted the future of classical computation. If it would follow Moore s Law, then silicon chips would eventually be no larger than a few atoms. But that introduces a problem, because the classic laws of physics (those that silicon chips are based on) do not apply on an atomic scale. Fortunately, quantum mechanics apply on an atomic scale and because of that, scientist began to speculate on a new breed of computers based on quantum physics. [3] The first quantum algorithm was devised by Peter Shor, a research and computer scientist at AT&T s Bell Laboratories in New Jersey. The algorithm solves an important number theory problem, factorization, that many encription methods (such as RSA) are based on. In fact, if a working quantum computer would be devised that could run this algorithm, no information anywhere in the world would be safe! Fortunately, methods do exist that use quantum properties to encrypt data as well. [3] Recent advancements in quantum computing The most advanced quantum computers today have 7 qubits [1], meaning that they are still at the state. Government organisations such as USA s DARPA, the UK s Defence Evaluation and Research Agency, the Deutsche Forschungsgemeinschaft, and The European Union are spending a lot of money in research as well as the leading players in the information technology and networking industries in order to get closer to a real machine. [10] Physicists in academic labs and at firms such as IBM, HP and NEC have tried a variety of quantum computing approaches but none seems likely to deliver a working machine in less than 10 years. IBM currently owns the most advanced quantum computer, which can manipulate 7 qubits, meaning that they are still at the state [1]. Despite the difficulties that are currently associated with quantum computing, a company called D- Wave Systems plans to have a working quantum computer in three years [15]. The computer will not be fully functional quantum compuer but will be able to solve problems like the traveling-salesman problem in reasonable time. D-Wave Systems have already applied for some patents [14] in the field. 5

6 By the end of 2005, researchers at the University of Michigan pushed quantum computing closer to the real world with the fabrication of a key component, an ion trap. This ion trap is important because it can host a quantum bit (qubit), the fundamental element in quantum computing. This could be one way to mass-produce hardware for quantum computers. [4] So, every day we are getting closer and closer, although it is a fact that we are still many years off from functional quantum computer. Current problems in quantum computing Although a lot of progress have been made over the past few years, quantum computers are still in their infancy. For them to be practical in solving real-world problems, they would need have several dozens of qubits. [1] We contacted (by ) one of Intel s quantum researchers, George I. Bourianoff1 1, titled as senior program manager in the Strategic Research Group at Intel Corporation. One of the questions we asked him was Is quantum computing the future? His answer was: Quantum computing requires ultra low temperatures and is out of equilibrium with the room temperature background and can therefore be very low power. However, I personally feel that it is too difficult to maintain quantum state and quantum computing is many years off if ever. As seen by his answer, quantum computing can become very efficient in terms of power consumption and cooling, allowing for a lot higher clock speed in quantum processors than in current processors. Despite this fact, we are still facing a very difficult problem, error correction. Quantum computers have the tendancy to enter an inconsistent state just by being exposed to the environment. This is unavoidable since just by reading the state of a qubit will force it to decend from the superposition to become either 0 or 1, effectively destroying the data held in the superposition. In 1998, researches at Los Alamos National Laboratory and MIT managed to read the state of a single qubit without actually looking at it. [3] This is a significant milestone in quantum error correction and has given a lot of hope to researchers in the field. 1 George Bourianoff Bio: 6

7 Quantum hardware is also just in its infancy but is becoming more important to test the theories that have been introduced. Seth Lloyd, Professor of Mechanical Engineering at MIT is currently a prominent researcher in quantum hardware. [3] We sent him a query about his work by but unfortunately did not receive a response in time. How does this technology relate to Moore s Law? In 1965, Gordon Moore, co-founder of Intel, wrote an article on the future development of semiconductor industry for the 35th anniversary issue of Electronics magazine. In the article, Moore noted that the complexity of minimum cost semiconductor components had doubled per year since the first prototype microship was produced in This exponential increase in the number of components on a chip became later known as Moore s Law. [7] In 1980, Moore s Law started to be described as the doubling of number of transistors on a chip every 18 months. At the beginning of the 1990s, Moore s Law became commonly interpreted as the doubling of microprocessor power every 18 months.[8] And today, Moore s Law is so general that it basically says that the rate of technological development will double every 18 months. The demise of Moore s Law has been predicted repeatedly over the last few decades and now more and more papers and articles are written about the end of Moore s Law. Although Moore s Law has been valid for all this time, like everything else it must come to an end. If we assume that Moore s Law will continue to hold in the next few years, today's chip manufacturing techniques will exhaust their capabilities by the year 2020, when a transistor would become no larger than the size of an atom. [11] In 2003, four members of the Institute of Electrical and Electronics Engineers, Zhirnov, Cavin, Hutchby, and Bourianoff submitted a paper that proposed that we may be about to hit a wall when it comes to scaling electronics. Their paper, Limits to Binary Logic Switch Scaling - A Gedanken Model [9] describes that eventually the tunnelling of electrons and holes will become too great for the transistor to perform reliable operations so the two state of the switch would become indistinguishable. This cannot be allowed in a binary system, but it would happen if its size gets as small as 4 nm. Indeed, this would be the size of a transistor produced in 13 years, keeping strict adherence to Moore's Law. 7

8 As mentioned before we contacted George I. Bourianoff, which is one of the writers of this paper, now working as senior program manager in the Strategic Research Group at Intel Corporation and has special research interest in quantum computing. One of the questions we asked him was how Intel is going to respond to these facts he concludes in his paper. His answer was: Intel can project scaling along more or less conventional lines (some variant of the field effect transistor) for the next 15 years or so. Beyond that, we are looking for alternative technologies that can be integrated on to CMOS to extend Moore's Law which we are confident we will be able to do. This might answer why Intel and others have not been pushing so much on this new technology. The need is maybe not as urgent as some might think, they have all those years to go. This does not only apply to Intel, other chip manufacturers are confident that they will be able keep up with Moore s Law for at least the next ten years with current technology. In the paper mentioned above they add that the heat from these transistors will be very difficult to moderate, because to do so would require somehow diverting the heat produced by this device away from the processor. The entire processor could also be cooled but that would produce more heat than it takes away. The heat problem has not even been solved by other technologies. In the we got from Bouriannoff he adds: The exact nature of those technologies is not clear. However, we believe that we must look to alternative technologies which are out of equilibrium with the room temperature thermal environment. In the case of the binary switch, maintaining state against room temperature fluctuations requires an energy barrier of ~.02 ev and is responsible for the energy dissipation in switching. On the web we found frequent quotes from scientists saying that Quantum computing begins when Moore s Law ends and others saying quantum computing will extend Moore s Law. It doesn t matter how they formulate it, we can be pretty sure that Moore s Law will be valid for the next 10 years at least, but if we think any further than years it is 8

9 almost impossible to predict about the state of processing power. It s an obvious fact that we must find some new technology if we are going to keep up with Moore s Law after 15 years or so but if quantum computers become real we might see growth in processing power that goes way beyond Moore s Law. Potential impact on software design and programming With the increase of multi core processors, software designers and programmers are increasingly feeling the pressure of using design patterns that enforce consistency, especially when the software is doing a lot of things at the same time. The parallel nature of quantum computing also requires new design patterns that enforce consistency, which could result in a major rethinking in software design. On a lighter note, a classic procedural style programming language for quantum computers has already been designed and implemented [6]. This is very important in making the transisiton from classic to quantum computers for programmers because it allows for the implementation and simulation of quantum algorithms. It also shows that classic methods of programming apply also to quantum computers. In general though, quantum software will not be extensively studied until quantum hardware becomes a reality and thus, at this point, we can only speculate how software design would change with quantum computing. Potential impact on daily life Everybody agrees that the impact quantum computer would have is huge. Many specialists even conclude that the impact on technology would likely be as large as the impact of the transistor. In our investigation of the potential impact quantum computers could have we found multiple speculations of the technological impact, some of them even far, far from reality (at least to us). But what we found interesting is that not much seems to be written about the financial/economical impact quantum computers could or would have. We found one very interesting article called "The Potential Impact of Quantum Computing" [10] originally published in the Croner Business Networks Briefing in What made this different from other articles about this topic is the education of the authors. Charles Ross 2, co-author of this article, studied accounting, law and economics 2 Quantum Information Partners LLP - Charles Ross - 9

10 but has spent his career since 1958 in computing. So we decided to contact Charles in case he might have spent more time than others in investigating the possible financial/economical impacts of quantum computers. Charles replied quickly, telling us that recently he had moved more into Quantum Cryptography. He is currently writing a paper about Quantum Computing and sent us the first thoughts for the paper. In his paper there is a chapter called Immediate Threat where he says CTOs, CIOs and CSOs need to review their current strategies as stored archives of today s transmissions will be susceptible to decryption in the future. He also told us that together with some colleagues he set up Quantum Information Partner LLP and they have done some work for the Department of Trade and Industry. Last May they set up a presentation at the Bank of England of all the Quantum Cryptography systems now available. So it is obvious that the threat is real and organizations that rely on cryptography are watching out. Security issues If quantum computers would become true we would face a lot of security issues, for example many security codes, like passwords can be broken just by guessing, check the answer and then guess again until you got the right code (today in most cases you won t actually get infinitely many guesses, but let s assume so). Let s say there are n possible answers to check, then it would take an average of (n+1)/2 guesses to find the answer using today's computers. The only reason why this is okay is that it would in most cases take years to do. But the time for quantum computer to solve this problem would probably be counted in minutes if not seconds. [2] Today's cryptography algorithms are based on mathematical problems that are hard to solve with the existing algorithm technologies and computing power. The problem of factoring a large number Figure 3: Potential quantum computing impact. [10] 10

11 that has been made from the multiplication of two large prime numbers is the most widely used of those mathematical problems. Quantum computer could easily factor large numbers, and would therefore be extremely useful for decoding and encoding secret information. Our current methods of encryption are simple compared to the complicated methods possible in quantum computers. [1] For example, one method of secure quantum communication is based on the measurement property of quantum state (recall that just by reading data in a quantum state forces it do decend from the superpostition). If A would send a secret quantum key to B, then B could easily detect that the key was intercepted, because if someone had intercepted it, read it, and forwarded it again, then it would no longer be in a quantum state. Similarly, if that same someone would not be capture the photon carrying the key, copy it, and send the original to B, since copying of quantum state is prohibited in quantum mechanics. [12] Searching Algorithms [13] have been written that would allow a quantum computer to almost instantaneously search massive databases and return very precise results. If this would come true, things like web search would take much less time and return more precise results. Business Like we said earlier, not much seems to be written about the financial impact quantum computers would have. That is not really surprising as the quantum technology is still just in its infancy and has a really long way to go until it will, if ever, come true. Specialist do although suggest to businessmen that have companies which rely on secure transmission or cryptography to watch out for quantum computing. Accessibility Quantum computing could become so powerful that speech recognition could become much more reliable than it is today and effectively eliminate keyboards. Furthermore if quantum teleportation becomes a reality then the need for classic wired or even wireless networks would be eliminated. 11

12 Disruptive technology People seem to be careful before speculating about the possibility of quantum computing being a disruptive technology, maybe because everybody is in its own corner trying to be the first instead of telling others about their plans. But the potential for disruptive technologies in the quantum field is huge and can be seen just be measuring the number of companies that are currently investing in all kinds of patents [14] in this field. Among those companies there are many small venture companies but also the big ones like HP, IBM, Microsoft and more. Conclusion Although the principles behind quantum computers have been established and small model systems constructed, we are still a long way from practical working computers. Our research shows that quantum computing has immense potential and that engineers are confident that the remaining hurdles will be surpassed. Optimists believe that quantum computers will eventually become mainstream and significantly change the information and computing industry in terms of speed, security and even accessibility. This new theory brings up a huge challenge for physicists in building working quantum computers and for computer scientists to develop new algorithms and methods to use such devices. There seem to be at least 10 years until we will see quantum computers that can be compared to today's computers, but if the quantum computing dream will become true it will probably have huge impact on our lives. If we live long enough, we just might get to experience it. 12

13 References [1] How Quantum Computers Will Work. Howstuffworks. Retrieved February 10 th 2006, from Howstuffworks. [2] Quantum computer. (March 2006). Wikipedia. Retrieved February 10 th 2006, from Wikipedia, the free encyclopaedia. [3] The Quantum Computer. (April, 2000). Jacob West. Retrieved February 10 th 2006, from Computer Science at Caltech. [4] Quantum Hardware. (December 2005). Kate Greene. Retrieved March 19 th 2006, from Technology Review. [5] Bibliography on Quantum Programming Languages. (June 2005). Simon Gay. Retrieved February 10 th 2006, from Simon Gay's Bibliography on Quantum Programming Languages. [6] QCL - A programming Language for Quantum Computers. (March 2004). Bernhard Oemer. Retrieved February 10 th 2006, from QCL - A Programming language for Quantum Computers. [7] The Lives and Death of Moore's Law. (October 2002). First Monday. Retrieved March 13 th 2006, from First Monday. [8] Moore's Law. (March 2006). Wikipedia. Retrieved March 13 th 2006, from Wikipedia, the free encyclopaedia. [9] Limits to Binary Logic Switch Scaling A Gedanken Model. (May 2003). Victor V. Zhirnov, Ralph K. Cavin, James A. Hutchby and George I. Bourianoff. Retrieved March 13 th 2006, from Intel Exploratory Research. 13

14 [10] Impact of Quantum Computing. (November 1998). Z/Yen Limited. Retrieved March 14 th 2006, from Zyen. [11] Life after Moore's Law: Quantum computing. (October 2000). InfoWorld Test Centre. Retrieved March 13 th 2006, from InfoWorld. [12] The Development of Quantum Hardware for Quantum Computing. (July 2005). A. J. Daley, J. I. Cirac and P. Zoller. Retrieved March 19 th 2006, from Center for Quantum Optics and Quantum Information. [13] Rapid sampling through quantum computing. (Feb 2000). Lov K. Grover. Retrieved March 13 th 2006, from lanl.arxiv.org e-print archive mirror. [14] Patents in Quantum Computing. Quantum Fog. Retrieved March 14 th 2006, from Quantum Fog. [15] Quantum Calculation. (July 2005). Erika Jonietz. Retrieved March 14 th 2006, from Technology Review. [16] Quantum Computing Architecture Overview. Tzvetan S. Metodi. Retrieved March 19 th 2006, from Tzvetan S. Metodi s website. 14

15 Appendicies Appendix A: to/from Charles Ross - former Secretary of the Quantum Computers in Europe Pathfinder Project. Thank you for your . The Oxford Business School recently circulated a report on the commercial prospects for QIP. You can find it at Recently I have been more involved with Quantum Cryptography Original Message From: "Guðmundur Már Einarsson" <gudmundurme03@ru.is> To: <charles.ross@qipartners.com> Sent: Tuesday, March 14, :06 PM Subject: Quantum computing, paper. Hello Mr. Charles, Together with some colleagues I set up Quantum Information Partners LLP and we have done some work for the Department of Trade and Industry. Last May we set up a presentation at the Bank of England of all the Quantum Cryptography systems now available. We have just signed a Letter of Understanding with Oxford University to set up a commercial test bed to enable various organisations to design and engineer commercial applications as part of a prototype ultra high volume, ultra high security comms backbone. Try We have not updated our site with the above news. We only signed the LOU yesterday! Also attached is the first thoughts for a paper I have to give in the Autumn about QC. There is a bit more about Quantum Computing generally. I hope this is a help. We are two students at our last year for BSc in computer science doing a research paper in a course called "New technology" at Reykjavik University, Iceland. The subject of our paper is "Quantum computing". We were reading an article about the impact of quantum computing where you seem to be the writer. It was published in 1998 so much can have changed since then but we decided to send you as we found out that you are also interested in economics and financials. What we are thinking is what financial or economic impact you think quantum computers would have if they would become real? It would be a huge honour if you could send us few lines. Best regards, Gudmundur Mar Einarsson Hlynur Tryggvason Good luck with your BSc's. Let me know how you get on. What are you plans when you graduate? Charles Ross 15

16 Appendix B: to/from George I. Bourianoff senior program manager in the Strategic Research group at Intel Dear Gudmundur, The questions you ask are good questions. Intel can project scaling along more or less conventional lines (some variant of the field effect transistor) for the next 15 years or so. Beyond that, we are looking for alternative technologies that can be integrated on to CMOS to extend Moore's aw which we are confident we will be able to do. The exact nature of those technologies is not clear. However, we believe that we must look to alternative technologies which are out of equilibrium with the room temperature thermal environment. In the case of the binary switch, maintaining state against room temperature fluctuations requires an energy barrier of ~.02 ev and is responsible for the energy dissipation in switching. Quantum computing requires ultra low temperatures and is out of equilibrium with the room temperature background and can therefore be very low power. However, I personally feel that is too difficult to maintain quantum state and quantum computing is many years off if ever. What I feel may be possible is to use spin based systems which are naturally isolated from the thermal background (e.g. nuclear spin systems) or else use magnetic cooling on more conventional spin devices. There are many problems but I think the answer lies in this direction. I hope this helps, George -----Original Message----- From: Guðmundur Már Einarsson [mailto:gudmundurme03@ru.is] Sent: Monday, March 13, :43 AM To: Bourianoff, George I Subject: Quantum computing, paper. Hello Mr. Bourianoff, We are two students at our last year for BSc in computer science doing research paper in a course called "New technology" at Reykjavik University, Iceland. The subject of our paper is "Quantum computing". We found very interesting paper called "Limits to Binary Logic Switch Scaling-A Gedanken Model" where you are one of the writers. We decided to write you as we saw that your current research interest is in quantum computing. We would be really honour if you could spend a little time answering this ) In the paper you find out that eventually the tunnelling of electrons and holes will become too great for the transistor to perform reliable operations so the two states of the switch would become indistinguishable. (plus the heat problems) If we expect that Moore's Law will hold this would probably happen in the next years if our calculations are right. So our questions are these: What do you think will happen then? Is this the end of Moore's Law? Is it something that Intel is worried about? Is quantum computing the future? Hope you have time to send us few lines, Best regards, Gudmundur Mar Einarsson Hlynur Tryggvason 16

Quantum Computing. Robert Sizemore

Quantum Computing. Robert Sizemore Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical

More information

what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?

what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? Inside the CPU how does the CPU work? what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? some short, boring programs to illustrate the

More information

Researcher 2015;7(5) http://www.sciencepub.net/researcher. Turing Machine for Quantum Computers. Mr. Abdur Razzaq

Researcher 2015;7(5) http://www.sciencepub.net/researcher. Turing Machine for Quantum Computers. Mr. Abdur Razzaq Turing Machine for Quantum Computers Mr. Abdur Razzaq MTB College Khalid Campus, Manthar road, Sadiq Abad, Punjab, Pakistan. mirzarazzaq@gmail.com Abstract This document gives the Exotic way to revolutionize

More information

Entanglement: The Holy Grail of High-Speed Design

Entanglement: The Holy Grail of High-Speed Design by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will

More information

they can be scaled up, to thousands or tens of thousands of qubits from their current size of a dozen or so, watch out!

they can be scaled up, to thousands or tens of thousands of qubits from their current size of a dozen or so, watch out! May/June 2008 Riding D-Wave A pioneer of quantum computing asks: Has a Canadian startup really demonstrated a prototype for a working, commercially viable quantum computer? By Seth Lloyd Computers process

More information

"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it

in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta. h is the Planck constant he called it 1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular

More information

Nanocomputer & Architecture

Nanocomputer & Architecture Nanocomputer & Architecture Yingjie Wei Western Michigan University Department of Computer Science CS 603 - Dr. Elise dedonckor Febrary 4 th, 2004 Nanocomputer Architecture Contents Overview of Nanotechnology

More information

Monday January 19th 2015 Title: "Transmathematics - a survey of recent results on division by zero" Facilitator: TheNumberNullity / James Anderson, UK

Monday January 19th 2015 Title: Transmathematics - a survey of recent results on division by zero Facilitator: TheNumberNullity / James Anderson, UK Monday January 19th 2015 Title: "Transmathematics - a survey of recent results on division by zero" Facilitator: TheNumberNullity / James Anderson, UK It has been my pleasure to give two presentations

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Javier Enciso encisomo@in.tum.de Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing

More information

Quantum Systems for Information Technology

Quantum Systems for Information Technology Lecture Quantum Systems for Information Technology fall term (HS) 2010 Lecturer: e Andreas Wallraff office: HPF D 8/9, ETH Hoenggerberg email: qsit-lecture@phys.ethz.ch What is this lecture about? Quantum

More information

Lesson Plan Title: To Be Or Not To Be: Choosing and Planning a Career

Lesson Plan Title: To Be Or Not To Be: Choosing and Planning a Career Lesson Plan Title: To Be Or Not To Be: Choosing and Planning a Career Overview: Students will investigate the process of making career choices and career development. Through research and analysis of the

More information

Mike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man?

Mike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man? Mike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man? Alexey: They re doing pretty good. Yeah, I don t know, we ve launched two

More information

CSCI 4717 Computer Architecture. Function. Data Storage. Data Processing. Data movement to a peripheral. Data Movement

CSCI 4717 Computer Architecture. Function. Data Storage. Data Processing. Data movement to a peripheral. Data Movement CSCI 4717/5717 Computer Architecture Topic: Functional View & History Reading: Sections 1.2, 2.1, & 2.3 Function All computer functions are comprised of four basic operations: Data processing Data storage

More information

NETWORKING. What is a packet-switching network?

NETWORKING. What is a packet-switching network? NETWORKING What is a packet-switching network? The internet is an example of a packet-switching network! All internet traffic is broken down into packets, which are small chunks of data that are sent individually

More information

QUANTUM ENIGMA Summer 2014 Ted McIrvine

QUANTUM ENIGMA Summer 2014 Ted McIrvine QUANTUM ENIGMA Summer 2014 Ted McIrvine June 17: Once Over Lightly & Newtonian Mechanics June 24: Electricity, Magnetism, Light & the Puzzles of 1900 July 1: Atomic Theory, Quantum Theory, Paradoxes and

More information

The D-Wave 2X Quantum Computer Technology Overview

The D-Wave 2X Quantum Computer Technology Overview The D-Wave 2X Quantum Computer Technology Overview D-Wave Systems Inc. www.dwavesys.com D-Wave Systems Founded in 1999, D-Wave Systems is the world s first quantum computing company. Our mission is to

More information

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert

More information

Encoding Text with a Small Alphabet

Encoding Text with a Small Alphabet Chapter 2 Encoding Text with a Small Alphabet Given the nature of the Internet, we can break the process of understanding how information is transmitted into two components. First, we have to figure out

More information

Unit A451: Computer systems and programming. Section 2: Computing Hardware 1/5: Central Processing Unit

Unit A451: Computer systems and programming. Section 2: Computing Hardware 1/5: Central Processing Unit Unit A451: Computer systems and programming Section 2: Computing Hardware 1/5: Central Processing Unit Section Objectives Candidates should be able to: (a) State the purpose of the CPU (b) Understand the

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

Quantum communication and quantum computing

Quantum communication and quantum computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 30-34 Quantum communication and quantum computing *Sweety Mittal, **Nilesh

More information

Enova X-Wall LX Frequently Asked Questions

Enova X-Wall LX Frequently Asked Questions Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and

More information

The science of encryption: prime numbers and mod n arithmetic

The science of encryption: prime numbers and mod n arithmetic The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process

More information

by Marianne Winslett Georg Gottlob http://web.comlab.ox.ac.uk/oucl/people/georg.gottlob.html (see also http://benner.dbai.tuwien.ac.

by Marianne Winslett Georg Gottlob http://web.comlab.ox.ac.uk/oucl/people/georg.gottlob.html (see also http://benner.dbai.tuwien.ac. Georg Gottlob Speaks Out on How Computer Science is a Continuation of Logic by Other Means, How Change Makes You Live Longer, How to Improve the Status of Computer Science, How to Interest Practical People

More information

PDF security - a brief history of development

PDF security - a brief history of development PDF security - a brief history of development Background Adobe was the first organization that set out to try and provide security controls for PDF based documents, and had their own particular views as

More information

What You Don t Know Will Haunt You.

What You Don t Know Will Haunt You. Comprehensive Consulting Solutions, Inc. Business Savvy. IT Smart. Joint Application Design (JAD) A Case Study White Paper Published: June 2002 (with revisions) What You Don t Know Will Haunt You. Contents

More information

Quantum technologies may be in their. nascence, but strategies regarding. their potential use cases within. defense and intelligence are not.

Quantum technologies may be in their. nascence, but strategies regarding. their potential use cases within. defense and intelligence are not. WHITE PAPER NOVEMBER 2015 Place Your Bets: Creating a Quantum Technology Strategy for Defense Firms Evan Rolfe Quantum technologies may be in their nascence, but strategies regarding their potential use

More information

CAs and Turing Machines. The Basis for Universal Computation

CAs and Turing Machines. The Basis for Universal Computation CAs and Turing Machines The Basis for Universal Computation What We Mean By Universal When we claim universal computation we mean that the CA is capable of calculating anything that could possibly be calculated*.

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu. Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers

More information

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth

More information

QUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS

QUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS QUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS Shubhangi Tyagi 1, Harshita Malhotra 2, Deepali Bhatia 3, Prashant Vats 4 1,2,3,4 Dept. of CSE, HMRITM, New Delhi (India) ABSTRACT

More information

24 th IEEE Annual Computer Communications Workshop (CCW)

24 th IEEE Annual Computer Communications Workshop (CCW) 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California

More information

Nanotechnology and Its Impact on Modern Computer

Nanotechnology and Its Impact on Modern Computer Global Journal of Researches in Engineering General Engineering Volume 12 Issue 4 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA)

More information

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4 Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve

More information

Quantum Computing: Selected Internet Resources for Librarians, Researchers, and the Casually Curious 1

Quantum Computing: Selected Internet Resources for Librarians, Researchers, and the Casually Curious 1 Quantum Computing: Selected Internet Resources for Librarians, Researchers, and the Casually Curious 1 Jill Cirasella Brooklyn College Library cirasella@brooklyn.cuny.edu Introduction Modern computer components

More information

Quantum Computing for Beginners: Building Qubits

Quantum Computing for Beginners: Building Qubits Quantum Computing for Beginners: Building Qubits Suzanne Gildert Condensed Matter Physics Research (Quantum Devices Group) University of Birmingham 28/03/2007 Overview of this presentation What is a Qubit?

More information

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

SIMS 255 Foundations of Software Design. Complexity and NP-completeness SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity

More information

Chapter 4 IT Infrastructure: Hardware and Software

Chapter 4 IT Infrastructure: Hardware and Software 1 Chapter 4 IT Infrastructure: Hardware and Software LEARNING TRACK 1: THE EVOLUTION OF IT INFRASTRUCTURE Evolution of IT Infrastructure: 1950 2005 The IT infrastructure in organizations today is an outgrowth

More information

(Academy of Economic Studies) Veronica Adriana Popescu (Academy of Economic Studies) Cristina Raluca Popescu (University of Bucharest)

(Academy of Economic Studies) Veronica Adriana Popescu (Academy of Economic Studies) Cristina Raluca Popescu (University of Bucharest) 24 (Academy of Economic Studies) Veronica Adriana Popescu (Academy of Economic Studies) Cristina Raluca Popescu (University of Bucharest) Abstract: the importance of computer science, with the most important

More information

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45 Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

230483 - QOT - Quantum Optical Technologies

230483 - QOT - Quantum Optical Technologies Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications

More information

Manipulating Nature: Limitations of Silicon Computers and the Rise of DNA Computing

Manipulating Nature: Limitations of Silicon Computers and the Rise of DNA Computing Travis Yoshimoto tsyoshimoto@gmail.com Manipulating Nature: Limitations of Silicon Computers and the Rise of DNA Computing Abstract: Computers run the world in which we live. However, as current computer

More information

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the

More information

Computer System: User s View. Computer System Components: High Level View. Input. Output. Computer. Computer System: Motherboard Level

Computer System: User s View. Computer System Components: High Level View. Input. Output. Computer. Computer System: Motherboard Level System: User s View System Components: High Level View Input Output 1 System: Motherboard Level 2 Components: Interconnection I/O MEMORY 3 4 Organization Registers ALU CU 5 6 1 Input/Output I/O MEMORY

More information

The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC

The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC Introduction The SA601 is a mixed signal device fabricated in 0.18u CMOS.

More information

THE NEXT FRONTIER IN COMPUTING QUANTUM OPTICAL COMPUTING. Presentation For Venture Capital Investment

THE NEXT FRONTIER IN COMPUTING QUANTUM OPTICAL COMPUTING. Presentation For Venture Capital Investment THE NEXT FRONTIER IN COMPUTING QUANTUM OPTICAL COMPUTING Presentation For Venture Capital Investment Dr. Brian Antao, CEO and Founder tundrasystems.eu 1 OPTICONDUCTORS: THE FUTURE OF SEMICONDUCTORS Mission:

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

SOME STRAIGHT TALK ABOUT THE COSTS OF DATA WAREHOUSING

SOME STRAIGHT TALK ABOUT THE COSTS OF DATA WAREHOUSING Inmon Consulting SOME STRAIGHT TALK ABOUT THE COSTS OF DATA WAREHOUSING Inmon Consulting PO Box 210 200 Wilcox Street Castle Rock, Colorado 303-681-6772 An Inmon Consulting White Paper By W H Inmon By

More information

Computer Architecture. Secure communication and encryption.

Computer Architecture. Secure communication and encryption. Computer Architecture. Secure communication and encryption. Eugeniy E. Mikhailov The College of William & Mary Lecture 28 Eugeniy Mikhailov (W&M) Practical Computing Lecture 28 1 / 13 Computer architecture

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Python Programming: An Introduction to Computer Science Chapter 1 Computers and Programs 1 Objectives To understand the respective roles of hardware and software in a computing system. To learn what computer

More information

Encryption and Digital Signatures

Encryption and Digital Signatures GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/

More information

Bits Superposition Quantum Parallelism

Bits Superposition Quantum Parallelism 7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism

More information

Choosing a Computer for Running SLX, P3D, and P5

Choosing a Computer for Running SLX, P3D, and P5 Choosing a Computer for Running SLX, P3D, and P5 This paper is based on my experience purchasing a new laptop in January, 2010. I ll lead you through my selection criteria and point you to some on-line

More information

Harnessing the Sun s Energy 1. Harnessing the Sun s Energy: Solar Power for Homes

Harnessing the Sun s Energy 1. Harnessing the Sun s Energy: Solar Power for Homes Harnessing the Sun s Energy 1 Harnessing the Sun s Energy: Solar Power for Homes Dan Tong Cluster 2 July 2008 Harnessing the Sun s Energy 2 Harnessing the Sun s Energy: Solar Power for Homes The use of

More information

COMPUTER SCIENCE AND ENGINEERING - Microprocessor Systems - Mitchell Aaron Thornton

COMPUTER SCIENCE AND ENGINEERING - Microprocessor Systems - Mitchell Aaron Thornton MICROPROCESSOR SYSTEMS Mitchell Aaron Thornton, Department of Electrical and Computer Engineering, Mississippi State University, PO Box 9571, Mississippi State, MS, 39762-9571, United States. Keywords:

More information

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security

More information

Solid-State Physics: The Theory of Semiconductors (Ch. 10.6-10.8) SteveSekula, 30 March 2010 (created 29 March 2010)

Solid-State Physics: The Theory of Semiconductors (Ch. 10.6-10.8) SteveSekula, 30 March 2010 (created 29 March 2010) Modern Physics (PHY 3305) Lecture Notes Modern Physics (PHY 3305) Lecture Notes Solid-State Physics: The Theory of Semiconductors (Ch. 10.6-10.8) SteveSekula, 30 March 2010 (created 29 March 2010) Review

More information

White Paper Perceived Performance Tuning a system for what really matters

White Paper Perceived Performance Tuning a system for what really matters TMurgent Technologies White Paper Perceived Performance Tuning a system for what really matters September 18, 2003 White Paper: Perceived Performance 1/7 TMurgent Technologies Introduction The purpose

More information

HOW ARKIVUM USES LTFS TO PROVIDE ONLINE ARCHIVING AS A SERVICE

HOW ARKIVUM USES LTFS TO PROVIDE ONLINE ARCHIVING AS A SERVICE HOW ARKIVUM USES LTFS TO PROVIDE ONLINE ARCHIVING AS A SERVICE Dr Matthew Addis, CTO Arkivum Whitepaper LTFS data tape helps Arkivum make the difference With an ever increasing need for organisations to

More information

Technology White Papers nr. 9 Paul Holister Cristina Román Vas Tim Harper

Technology White Papers nr. 9 Paul Holister Cristina Román Vas Tim Harper Technology White Papers nr. 9 Paul Holister Cristina Román Vas Tim Harper MOLECULAR ELECTRONICS Technology White Papers nr. 9 Release Date: Published by Científica Científica, Ltd. www.cientifica.com Científica

More information

Basics of Information Systems

Basics of Information Systems Basics of Information Systems Dr. LászlóKutor Basic Concepts Development Trends Information processing paradigms http://uni-obuda.hu/users/kutor BIS 2014 BIS/31/1 Course Requirements First mid-term exam:

More information

CREATE TAX ADVANTAGED RETIREMENT INCOME YOU CAN T OUTLIVE. create tax advantaged retirement income you can t outlive

CREATE TAX ADVANTAGED RETIREMENT INCOME YOU CAN T OUTLIVE. create tax advantaged retirement income you can t outlive create tax advantaged retirement income you can t outlive 1 Table Of Contents Insurance Companies Don t Just Sell Insurance... 4 Life Insurance Investing... 5 Guarantees... 7 Tax Strategy How to Get Tax-Free

More information

SOFTWARE-DEFINED NETWORKS

SOFTWARE-DEFINED NETWORKS THE PROMISE OF SOFTWARE-DEFINED NETWORKS SDNs offer organizations a flexible solution capable of reimagining the enterprise network. The IT community is abuzz with discussions about software-defined networks

More information

FPGA Design From Scratch It all started more than 40 years ago

FPGA Design From Scratch It all started more than 40 years ago FPGA Design From Scratch It all started more than 40 years ago Presented at FPGA Forum in Trondheim 14-15 February 2012 Sven-Åke Andersson Realtime Embedded 1 Agenda Moore s Law Processor, Memory and Computer

More information

Secretary of Energy Advisory Board

Secretary of Energy Advisory Board Secretary of Energy Advisory Board Follow Up Response from the Task Force on High Performance Computing November 30, 2014 On August 18, 2014, the Secretary of Energy Advisory Board approved the report

More information

Parallelism and Cloud Computing

Parallelism and Cloud Computing Parallelism and Cloud Computing Kai Shen Parallel Computing Parallel computing: Process sub tasks simultaneously so that work can be completed faster. For instances: divide the work of matrix multiplication

More information

Security Issues with Distributed Web Applications

Security Issues with Distributed Web Applications Security Issues with Distributed Web Applications Device Connectivity We are entering the era of Device Connectivity, which is the fourth wave of evolution for Internet-enabled applications. The first

More information

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger THIN CLIENT OPTIONS Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger Brian Madden: Hello. My name is Brian Madden, and welcome to Part 2 of our threepart video series about

More information

Fibre broadband community pack

Fibre broadband community pack Fibre broadband community pack Dear Parish Clerk We are pleased to inform you that fibre broadband has been brought to your community as part of Wiltshire Council s Wiltshire Online programme. Please help

More information

Technical problems. Taking notes. Mentioning documents. Answering questions. Problems with the questions. Asking questions.

Technical problems. Taking notes. Mentioning documents. Answering questions. Problems with the questions. Asking questions. Tips and language for telephone interviews What tips could you give someone about each stage of telephone interviews written below? Starting the telephone call Technical problems Taking notes Mentioning

More information

Quantum is Sexy. Google - Millions of Search Hits

Quantum is Sexy. Google - Millions of Search Hits Quantum Computation A Glimpse Into the Future of Computing 6/16/2004 Richard Gordon richard_gordon@verizon.net Agenda Introduction Richard Gordon Quantum 101> Dr. Collin Williams JPL Dr. Colin Williams

More information

Computer Systems Structure Main Memory Organization

Computer Systems Structure Main Memory Organization Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory

More information

Book 3 Cost Estimating in an Agile Development Environment. (early release)

Book 3 Cost Estimating in an Agile Development Environment. (early release) Book 3 Cost Estimating in an Agile Development Environment (early release) Book 3: Cost Estimating in an Agile Development Environment In this third book I ll use the slides I gave at a speech several

More information

Generations of the computer. processors.

Generations of the computer. processors. . Piotr Gwizdała 1 Contents 1 st Generation 2 nd Generation 3 rd Generation 4 th Generation 5 th Generation 6 th Generation 7 th Generation 8 th Generation Dual Core generation Improves and actualizations

More information

In Quest of an EMR System for Surgeons A Surgeon and a Reporter Search for the Ultimate or At Least Passable System

In Quest of an EMR System for Surgeons A Surgeon and a Reporter Search for the Ultimate or At Least Passable System print this article In the News ISSUE: JANUARY 2015 VOLUME: 42:01 In Quest of an EMR System for Surgeons A Surgeon and a Reporter Search for the Ultimate or At Least Passable System by Victoria Stern Jarrod

More information

Least Privilege and More 1

Least Privilege and More 1 Least Privilege and More 1 Fred B. Schneider Cornell University, Ithaca, New York, USA Introduction What today is known as the Principle of Least Privilege was described as a design principle in a paper

More information

Club Accounts. 2011 Question 6.

Club Accounts. 2011 Question 6. Club Accounts. 2011 Question 6. Anyone familiar with Farm Accounts or Service Firms (notes for both topics are back on the webpage you found this on), will have no trouble with Club Accounts. Essentially

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

The Importance of Independent Testing

The Importance of Independent Testing The Importance of Independent Testing Amy Gander University of Northern Iowa Department of Computer Science Cedar Falls, IA 50614 Gandera3081@uni.edu Computer science students without industrial experience

More information

CS 159 Two Lecture Introduction. Parallel Processing: A Hardware Solution & A Software Challenge

CS 159 Two Lecture Introduction. Parallel Processing: A Hardware Solution & A Software Challenge CS 159 Two Lecture Introduction Parallel Processing: A Hardware Solution & A Software Challenge We re on the Road to Parallel Processing Outline Hardware Solution (Day 1) Software Challenge (Day 2) Opportunities

More information

Four Keys to Successful Multicore Optimization for Machine Vision. White Paper

Four Keys to Successful Multicore Optimization for Machine Vision. White Paper Four Keys to Successful Multicore Optimization for Machine Vision White Paper Optimizing a machine vision application for multicore PCs can be a complex process with unpredictable results. Developers need

More information

HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION

HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION SARA C. BILLEY Mathematics research is fun, engaging, difficult, frustrating, and different than most 9-5 jobs. This article is meant to provide some

More information

GPU File System Encryption Kartik Kulkarni and Eugene Linkov

GPU File System Encryption Kartik Kulkarni and Eugene Linkov GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through

More information

Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE.

Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. Straddling the Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. E R I C J O D O I N B S I D E S O T T A WA 2 0 1

More information

Photonic Networks for Data Centres and High Performance Computing

Photonic Networks for Data Centres and High Performance Computing Photonic Networks for Data Centres and High Performance Computing Philip Watts Department of Electronic Engineering, UCL Yury Audzevich, Nick Barrow-Williams, Robert Mullins, Simon Moore, Andrew Moore

More information

CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 1 History of Computers

CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 1 History of Computers CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 1 History of Computers 1 Topics 1. Definition of computer 2. Earliest computer 3. Computer History 4. Computer Generations 2 Definition of Computer Computer is

More information

Counselor Lesson Plan

Counselor Lesson Plan counselors for computing Counselor Lesson Plan Introduce Students to Computer Science in an Engaging Way Objective The intention of this lesson is to introduce students to computer science in such a way

More information

A Beginning in the Reversible Logic Synthesis of Sequential Circuits

A Beginning in the Reversible Logic Synthesis of Sequential Circuits A Beginning in the Reversible Logic Synthesis of Sequential s Himanshu Thapliyal and M.B Srinivas Centre for VLSI and Embedded System Technologies International Institute of Information Technology, Hyderabad,

More information

The Field Study Handbook: A Common Sense Approach for Discovering User Needs

The Field Study Handbook: A Common Sense Approach for Discovering User Needs I n c r e m e n t a l S i t e R e p o r t XYZ Brokerage Field Study Incremental Report Mary C., Customer Los Angeles Began investing one and a half years ago, but grew up in an environment where stocks

More information

Department of Commerce National Institute of Standards and Technology (NIST)

Department of Commerce National Institute of Standards and Technology (NIST) Department of Commerce National Institute of Standards and Technology (NIST) Response to Request for Information on Quantum Information Science and the Needs of U.S. Industry Posted Date: April 8, 2015

More information

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction

More information

Regulatory Compliance

Regulatory Compliance Regulatory Compliance Security: From a security standpoint, disk, tape and DVD, none of them meet the regulatory requirements of Sarbanes Oxley or HIPAA simply because they are generally not encrypted.

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Transcription. Crashplan vs Backblaze. Which service should you pick the short version

Transcription. Crashplan vs Backblaze. Which service should you pick the short version Transcription Crashplan vs Backblaze Hey and welcome to cloudwards.net and another exciting video of two major unlimited online backup services namely Backblaze and CrashPlan or CrashPlan or Backblaze.

More information

Equipment Room Database and Web-Based Inventory Management

Equipment Room Database and Web-Based Inventory Management Equipment Room Database and Web-Based Inventory Management Project Proposal Sean M. DonCarlos Ryan Learned Advisors: Dr. James H. Irwin Dr. Aleksander Malinowski December 12, 2002 TABLE OF CONTENTS Project

More information

Technological Diffusion in the Development of the Mainframe. Computer and Early Semiconductors

Technological Diffusion in the Development of the Mainframe. Computer and Early Semiconductors Technological Diffusion in the Development of the Mainframe Computer and Early Semiconductors Lav Varshney Inventing an Information Society ENGRG/ECE 298 and S&TS/HIST 292 Third Essay Assignment Question

More information

Cloud Computing Hits Snag in Europe

Cloud Computing Hits Snag in Europe Cloud Computing Hits Snag in Europe By KEVIN J. O'BRIEN Published: September 19, 2010 BERLIN in the world of ideas, cloud computing has the potential to revolutionize the way people work. Spain Is Ripe

More information