The new work, by University of Vienna quantum computing pioneer Anton Zeilinger and a team of international scientists, combines the quantum computing and cloud computing.
Quantum computing will use the inherent uncertainties in quantum physics to carry out fast, complex computations.
One of the peculiarities of the branch of physics called quantum mechanics is that objects can be in more than one state at once, with the states of different objects tied together in ways that even Albert Einstein famously referred to as "spooky".
Instead of the 0 and 1 "bits" of digital computing, quantum computing aims to make use of these mixed and entangled states to perform calculations at comparatively breathtaking speeds.
Other quantum trickery comes in cryptography, the art of encrypting data. Data is encoded in delicately prepared states - most often those of single particles of light called photons - and the data cannot be "read" without destroying them.
Quantum cryptography uses this feature to send the "keys" to decrypting messages with high security.
more: http://www.bbc.co.uk/news/science-environment-16636580
Friday, January 20, 2012
Wednesday, January 18, 2012
Stability Returns to R&D Funding
Reflecting recent trends, pros- pects for R&D funding vary by region, with the United States (U.S.) expect- ing R&D growth to track GDP growth, Europe contemplating fiscal austerity that may restrict investment for several years, and most Asian countries maintaining strong financial commitments to R&D.
Total global spending on R&D is anticipated to increase 3.6%, to almost $1.2 trillion.
For more: http://www.battelle.org/aboutus/rd/2011.pdf
Saturday, January 7, 2012
The White House Cyber Policy Review
Assuring a Trusted and Resilient Information and Communications Infrastructure
Cyberspace touches practically everything and everyone. It provides a platform for innovation and prosperity and the means to improve general welfare around the globe. But with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises, and individual rights. The government has a responsibility to address these strategic vulnerabilities to ensure that the United States and its citizens, together with the larger community of nations, can realize the full potential of the information technology revolution.
The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient. Without major advances in the security of these systems or significant change in how they are constructed or operated, it is doubtful that the United States can protect itself from the growing threat of cybercrime and state-sponsored intrusions and operations.
http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
Hardware qualification, a must in a cyber strategy
by paganinip on January 1st, 2012
The ability to manage every aspect of what we have described must be part of a cyber strategy that each country must deploy and that is the only way to guarantee satisfactory security levels.
http://www.linkedin.com/news?viewArticle=&articleID=1019281229&gid=43269&type=member&item=87281020&articleURL=http%3A%2F%2Fsecurityaffairs%2Eco%2Fwordpress%2F1198%2Fcyber-crime%2Fhardware-qualification-a-must-in-a-cyber-strategy%2Ehtml&urlhash=aBLE&goback=%2Egde_43269_member_87281020
2011: security's most spectacular stuff-ups
It has been a giant year in security, with numerous data breaches, a reassessment of whether certificate authorities are safe, accusations of hidden mobile spyware and companies given wake-up calls as to whether they're secure or not.
http://www.zdnet.com.au/2011-securitys-most-spectacular-stuff-ups-339328509.htm
Japan tests $2.28m cyber-defence virus
The Japanese government is testing a self-defence virus that has the objective of tracking down the source of cyber attacks and removing the threat.
http://www.zdnet.com.au/japan-tests-228m-cyber-defence-virus-339328893.htm
Subscribe to:
Posts (Atom)