Friday, January 20, 2012

Quantum Computing on a Cloud

The new work, by University of Vienna quantum computing pioneer Anton Zeilinger and a team of international scientists, combines the quantum computing and cloud computing.
Quantum computing will use the inherent uncertainties in quantum physics to carry out fast, complex computations.
One of the peculiarities of the branch of physics called quantum mechanics is that objects can be in more than one state at once, with the states of different objects tied together in ways that even Albert Einstein famously referred to as "spooky".
Instead of the 0 and 1 "bits" of digital computing, quantum computing aims to make use of these mixed and entangled states to perform calculations at comparatively breathtaking speeds.
Other quantum trickery comes in cryptography, the art of encrypting data. Data is encoded in delicately prepared states - most often those of single particles of light called photons - and the data cannot be "read" without destroying them.
Quantum cryptography uses this feature to send the "keys" to decrypting messages with high security.
more: http://www.bbc.co.uk/news/science-environment-16636580

Wednesday, January 18, 2012

Stability Returns to R&D Funding

Reflecting recent trends, pros- pects for R&D funding vary by region, with the United States (U.S.) expect- ing R&D growth to track GDP growth, Europe contemplating fiscal austerity that may restrict investment for several years, and most Asian countries maintaining strong financial commitments to R&D. Total global spending on R&D is anticipated to increase 3.6%, to almost $1.2 trillion. For more: http://www.battelle.org/aboutus/rd/2011.pdf

Saturday, January 7, 2012

The White House Cyber Policy Review

Assuring a Trusted and Resilient Information and Communications Infrastructure Cyberspace touches practically everything and everyone. It provides a platform for innovation and prosperity and the means to improve general welfare around the globe. But with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises, and individual rights. The government has a responsibility to address these strategic vulnerabilities to ensure that the United States and its citizens, together with the larger community of nations, can realize the full potential of the information technology revolution. The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient. Without major advances in the security of these systems or significant change in how they are constructed or operated, it is doubtful that the United States can protect itself from the growing threat of cybercrime and state-sponsored intrusions and operations. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

Hardware qualification, a must in a cyber strategy

by paganinip on January 1st, 2012 The ability to manage every aspect of what we have described must be part of a cyber strategy that each country must deploy and that is the only way to guarantee satisfactory security levels. http://www.linkedin.com/news?viewArticle=&articleID=1019281229&gid=43269&type=member&item=87281020&articleURL=http%3A%2F%2Fsecurityaffairs%2Eco%2Fwordpress%2F1198%2Fcyber-crime%2Fhardware-qualification-a-must-in-a-cyber-strategy%2Ehtml&urlhash=aBLE&goback=%2Egde_43269_member_87281020

2011: security's most spectacular stuff-ups

It has been a giant year in security, with numerous data breaches, a reassessment of whether certificate authorities are safe, accusations of hidden mobile spyware and companies given wake-up calls as to whether they're secure or not. http://www.zdnet.com.au/2011-securitys-most-spectacular-stuff-ups-339328509.htm

Japan tests $2.28m cyber-defence virus

The Japanese government is testing a self-defence virus that has the objective of tracking down the source of cyber attacks and removing the threat. http://www.zdnet.com.au/japan-tests-228m-cyber-defence-virus-339328893.htm