Toggle light / dark theme

Forget 3D printing, are you ready for 4D printing?


The rapid development of a range of emerging technologies is driving four revolutions in military and security capabilities to which the global defence and security industry is increasingly required to respond.

Perception, processing and cognition

New approaches for both humans and machines to collect, synthesise, digest and discern information are necessary to make sense of complex and fast-moving strategic and operational contexts. Getting (and staying) ahead of threats and maintaining and leveraging situational awareness – especially in environments frequently marked simultaneously by a surfeit of available information of variable quality and timeliness and opacity – is beyond the capacity of legacy technologies and human capabilities.

Read more

(Phys.org)—The relationship between communication complexity problems, Bell nonlocal correlations and the advantage of quantum over classical strategies has long been recognized, but has been confirmed in only two problems. Recently, however, scientists at University of Cambridge, University of Amsterdam, CWI, QuSoft, Gdansk University, Gdansk University of Technology, Adam Mickiewicz University, and Jagiellonian University employed a two-part method based on port-based teleportation – a scheme of quantum teleportation where a receiver has multiple (N) output ports and obtains the teleported state by merely selecting one of the N ports1,2. The researchers used the quantum protocol based on the given communication complexity game to construct a set of quantum measurements on a maximally entangled state to show that any large advantage over the best known classical strategy makes use of Bell nonlocal correlations. In so doing, the researchers assert, they have provided the missing link to the fundamental equivalence between Bell nonlocality and quantum advantage. Moreover, their results have significant implications for classical information processing and the development of more efficient teleportation protocols.

Dr. Sergii Strelchuk discussed the paper, “Quantum communication complexity advantage implies violation of a Bell inequality,” that he and his colleagues published in Proceedings of the National Academy of Sciences. Two of the challenges the scientists faced were encountered in demonstrating that any large advantage over the best known classical strategy makes use of Bell nonlocal correlations, and in providing the “missing link” (in the form of a general connection) between a large quantum advantage in communication complexity and Bell nonlocality. “One conceptual issue was finding a procedure that converts any quantum strategy for a given communication complexity problem into a set of correlations – that is, probability distributions corresponding to the measurement outcomes during the protocol,” Strelchuk tells Phys.org.

Read more

Computers can identify you based on your butt and your walk, not to mention your smell…

Around half of consumers would “choose anything but a traditional username and password account registration when given the option”, according to identity management firm Gigya.

But would they choose these truly bizarre password alternatives that have been proposed over the years, and would your business be safer switching to them? 1. Biometric Buttocks.

Read more

1st, this article is full of inaccuracies such as 15 years away reported by NIST. Well, maybe 2 years ago they said this; however, in Jan. they and the NSA both stated that QC was less than 10 years away and a huge threat given the advancements by China. Also, this author writes that a hybrid system will be fine to withstand an attack by a hacker on QC. And, that s incorrect.

Also, if this article looks like another article published over a week ago by someone on Forbes; well it is because the author looks like copied word-for-word from the article in Forbes.

Read more

Glad that folks have awaken to the fact that QC is indeed coming and best to learn about this technology and make it part of the IT’s Future State.

http://www.welivesecurity.com/2016/06/14/quantum-computation

Cryptography-armageddon/


ESET’s Cassius Puodzius takes an in-depth look at cryptography, exploring quantum computing (one of the resources in the toolkit of cryptanalysts).

Read more