How Deloitte Italy built a digital payments fraud detection solution using quantum machine learning and Amazon Braket
By: AWS View more from AWS >>
Download this next:
The latest on Microsoft & Atom Computing's Commercial Quantum Machine
By: Microsoft
Type: Blog
In the quantum computing industry, not all types of qubits allow for the quantum error correction needed to enable more reliable quantum computing. And without reliable computing, valuable solutions to classically intractable problems are unlikely to be achieved.
Microsoft and Atom Computing have advanced quantum computing by entangling 24 logical qubits from neutral atoms, the highest on record, according to Microsoft’s blog. Now, they offer a reliable quantum computer integrated with Azure Elements, combining logical qubits, cloud HPC, and AI models.
Read this blog to learn more about this quantum computing breakthrough and the new commercial offering from Microsoft and Atom Computing.
These are also closely related to: "How Deloitte Italy built a digital payments fraud detection solution using quantum machine learning and Amazon Braket"
-
A practical guide to post quantum cryptography
By: Utimaco
Type: Webcast
Emerging quantum threats to classic cryptography are introducing significant business risk and setting the stage for potentially dire consequences.
This webcast examines the importance of post quantum cryptography in mitigating the quantum threat. Inside, find a crash course on post quantum cryptography, with a focus on:
- What the quantum threat is and why it’s so important
- When and how to migrate to post quantum cryptography
- Stateful hash-based signatures: Implementation best practices
- And more
-
Achieve Quantum Resistance with Utimaco
By: Utimaco
Type: Product Overview
As quantum computing evolves, it's vital to adopt post-quantum cryptography (PQC) for cybersecurity. Utimaco's u.trust HSM Se-Series, FIPS 140-2 Level 3 certified, with Quantum Protect firmware, offers robust protection.
Quantum Protect features NIST-recommended PQC algorithms like CRYSTALS-KYBER for encryption and signature schemes CRYSTALS-Dilithium, HSS, LMS, XMSS, and XMSS-MT, securing your systems against quantum threats.
Utimaco also provides a complimentary PQC simulator to test quantum-resistant algorithms' performance in your setup. Discover how to ready your IT for the quantum era in the full product overview.
Find more content like what you just read:
-
Quantum threats: The cybersecurity survivalist’s field guide
By: Utimaco
Type: Webcast
Quantum computers have the potential to significantly enhance efficiency and problem-solving capabilities; however, in the wrong hands, they also pose a substantial threat to the security of present-day cryptography. This webinar shines a light on the world of quantum threats and offers proven defense mechanisms.
-
Jargon Buster Guide to Post Quantum Cryptography
By: TechTarget ComputerWeekly.com
Type: eGuide
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
-
Quantum computing: What are the data storage challenges?
By: TechTarget ComputerWeekly.com
Type: eGuide
Quantum computing will process massive amounts of information. But, to be fully effective, quantum computing will need to access, analyse and store huge amounts of data. One area, in particular, will have to deal with significant challenges: data storage. How will today's storage systems keep pace?
-
An introduction to quantum computing
By: TechTarget ComputerWeekly.com
Type: eGuide
Quantum computing promises to revolutionise the capabilities of IT and take it to the next level beyond Moore's Law. But we're not there yet, and there is much to do before it reaches the mainstream. In this guide, we examine the challenges and opportunities of quantum computing.
-
What will a quantum datacentre look like?
By: TechTarget ComputerWeekly.com
Type: Infographic
IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.
-
Making the business case for quantum computing
By: TechTarget ComputerWeekly.com
Type: eGuide
Tech startups, investors, major suppliers and even leading-edge companies are already placing a bet on the future of quantum computing. In this e-guide, we hear from experts in the tech sector, business consultancies and international corporations as they examine the potential of quantum computing.
-
CW Buyer's Guide to Emerging technology
By: TechTarget ComputerWeekly.com
Type: eBook
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
-
AI, HPC, and quantum: Top use cases in R&D
By: Microsoft
Type: White Paper
Advancements in high-performance computing (HPC), AI, and quantum technologies are already transforming scientific discoveries, as scientists hunt for new molecules to tackle today's most pressing challenges like climate change. Download this white paper to examine how these technologies accelerate discovery with concrete examples.
-
Quantum vs. Quantum
By:
Type: Talk
As emphasized by the recent controversy about quantum supremacy, the quantum computer is already a reality. Although the timing of the arrival of a quantum computer capable of factoring large integers and therefore of breaking most existing public key cryptosystems is still under debate, the risk to our cybersecurity infrastructure is now real and steadily increasing. In order to prepare our cybersecurity framework to the quantum era, and build a Quantum-Safe infrastructure, action must be taken today. Fortunately, some solutions exist today and are constantly improving. There come in two very different flavours. One is to find new mathematical problems, which should be immune to the quantum computer threat. This is the domain of Post-Quantum Cryptography. The second is to use the peculiar properties of quantum itself to fight against the quantum computer threat. Current solutions are known as Quantum Random Number Generators, which improve the quality of keys, and Quantum Key Distribution, which enable secure distribution of these keys. Quantum Networks and the future Quantum Internet will soon make these solutions usable in a broad context. In this presentation, we will outline both solutions and focus on the quantum ones.
-
Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
By: TechTarget ComputerWeekly.com
Type: Ezine
This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
-
Quantum Networking 101
By:
Type: Talk
Quantum Networking 101 is an in-depth introduction to quantum networking, designed to equip you with the foundational knowledge you need to navigate the quantum revolution and harness its immense potential today. Join Daniel Winton, Solutions Engineer at Aliro Quantum, in this session that digs deep into the foundational principles, scientific underpinnings, and practical applications of quantum networks. Business leaders and technologists will gain a practical understanding of entanglement-based quantum networking. In this webinar you’ll learn: - The basic principles of quantum mechanics and how they form the basis of a quantum network - How quantum networks compare to classical networks, and the distinct advantages offered by quantum communication - At a high-level, the components of a quantum network and how they integrate into classical networks Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
Cloud Security in the Quantum Era: Getting Ready for Y2Q
By:
Type: Video
CSA is a pioneer in promoting awareness about the quantum threat. The Quantum-Safe Security Working Group was created seven years ago, bringing together industry professionals and academics from different backgrounds. Today, we continue our education and awareness program by starting our Y2Q (year to quantum) countdown. Based on current estimations, we have selected a plausible date, by which a quantum computer should be able to break our cybersecurity infrastructure. We will use this date as a flag, to emphasize the imminence of the threat and the need to find and implement new solutions. In this talk, we will briefly explain the quantum computer and quantum threat, then present possible solutions. Some are based on new algorithms, known as quantum-resistant algorithms. They can be complemented with quantum solutions, which utilize the same peculiar properties of the quantum world to thwart the quantum computer threat. Together, they will be part of a new quantum-safe infrastructure, which will recover and even improve cloud security.
-
Have you started developing for practical quantum advantage?
By:
Type: Video
Join us to learn how to prepare for practical quantum advantage today. Participate in live Q&A chat with the Azure Quantum Team and be one of the first to hear about recent advancements. Learn what type of end-to-end system is required for scalable quantum computing and what can be done now to get ready for it. See the new Azure Quantum Resource Estimator - the first end-to-end toolset that provides estimates for the number of logical and physical qubits as well as runtime required to execute quantum applications on fault-tolerant quantum computers. Understand the number of qubits required for a quantum solution and the differences between qubit technologies that allow innovators to prepare and refine their quantum solutions to run on future scaled quantum machines and ultimately accelerate their impact. Explore how Microsoft is empowering innovators today by co-designing tools to optimize quantum solutions running programs on today’s diverse and maturing quantum systems, and preparing you for tomorrow’s scaled quantum compute.
-
Scheduling Quantum Error Correction in Entanglement-based Secure Networks
By:
Type: Talk
One challenge in building entanglement-based networks is the management of quantum errors, which occur due to the nature of the entanglement distribution protocols used to send and receive quantum information. Quantum error correction (QEC) is used in quantum networking to protect quantum information from errors caused by decoherence and noise. Join Keith Kenemer, Research Software Engineer at Aliro Quantum, as he walks us through the fundamentals of entanglement distribution and QEC, and a solution based on Aliro Quantum’s recent research that can be used to manage quantum errors locally. In this webinar you will learn: - Overview of quantum network architectures and evolution (Gen 1, Gen 2, Gen 3) - Fundamentals of entanglement distribution: protocols and challenges - Fundamental concepts of QEC - A localized QEC solution - What this solution looks like in simulations, and what we can learn from the simulation Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
Cybersecurity in the Quantum Era
By:
Type: Talk
As emphasized by the recent announcements on the quantum advantage, quantum computers can already perform computations, deemed impossible or at least very lengthy with classical computers. Having access to improved computing power is great news in many areas. However, this also represents a threat for most of our communications. Indeed, cryptography, which is underpinning the security of our communication infrastructure, is based on some hard mathematical problems, which will become tractable with a quantum computer. Our complete cybersecurity infrastructure has to be revamped. In this talk, we start with a brief explanation of the quantum computer and explain the quantum threat. We then present possible solutions. Some solutions are based on new algorithms. They are known as quantum-resistant algorithms. These can be complemented with quantum solutions, which utilize the same peculiar properties of the quantum world to thwart the quantum computer threat. Together, they will be part of a new quantum-safe infrastructure. Any organisation or person relying on secure communication for his business or personal life has to start taking this new threat into account.
-
Cybersecurity in the Quantum Era
By:
Type: Talk
As emphasized by the recent announcements on the quantum advantage, quantum computers can already perform computations, deemed impossible or at least very lengthy with classical computers. Having access to improved computing power is great news in many areas. However, this also represents a threat for most of our communications. Indeed, cryptography, which is underpinning the security of our communication infrastructure, is based on some hard mathematical problems, which will become tractable with a quantum computer. Our complete cybersecurity infrastructure has to be revamped. In this talk, we start with a brief explanation of the quantum computer and explain the quantum threat. We then present possible solutions. Some solutions are based on new algorithms. They are known as quantum-resistant algorithms. These can be complemented with quantum solutions, which utilize the same peculiar properties of the quantum world to thwart the quantum computer threat. Together, they will be part of a new quantum-safe infrastructure. Any organisation or person relying on secure communication for his business or personal life has to start taking this new threat into account.
-
Cybersecurity in the Quantum Era
By:
Type: Talk
As emphasized by the recent announcements on the quantum advantage, quantum computers can already perform computations, deemed impossible or at least very lengthy with classical computers. Having access to improved computing power is great news in many areas. However, this also represents a threat for most of our communications. Indeed, cryptography, which is underpinning the security of our communication infrastructure, is based on some hard mathematical problems, which will become tractable with a quantum computer. Our complete cybersecurity infrastructure has to be revamped. In this talk, we start with a brief explanation of the quantum computer and explain the quantum threat. We then present possible solutions. Some solutions are based on new algorithms. They are known as quantum-resistant algorithms. These can be complemented with quantum solutions, which utilize the same peculiar properties of the quantum world to thwart the quantum computer threat. Together, they will be part of a new quantum-safe infrastructure. Any organisation or person relying on secure communication for his business or personal life has to start taking this new threat into account.
-
Cybersecurity in the Quantum Era: Quantum versus Quantum
By:
Type: Talk
In this webinar, you will learn more about how quantum technologies can help fight the threat of quantum computers. In particular, we will discuss the value of true randomness, obtained from quantum phenomena. Additionally, we will discuss Quantum Key Distribution (QKD) and its integration into Thales' quantum-safe network encryption solutions.
-
Cloud Security in the Quantum Era: Getting Ready for Y2Q
By:
Type: Replay
CSA is a pioneer in promoting awareness about the quantum threat. The Quantum-Safe Security Working Group was created seven years ago, bringing together industry professionals and academics from different backgrounds. Today, we continue our education and awareness program by starting our Y2Q (year to quantum) countdown. Based on current estimations, we have selected a plausible date, by which a quantum computer should be able to break our cybersecurity infrastructure. We will use this date as a flag, to emphasize the imminence of the threat and the need to find and implement new solutions. In this talk, we will briefly explain the quantum computer and quantum threat, then present possible solutions. Some are based on new algorithms, known as quantum-resistant algorithms. They can be complemented with quantum solutions, which utilize the same peculiar properties of the quantum world to thwart the quantum computer threat. Together, they will be part of a new quantum-safe infrastructure, which will recover and even improve cloud security. This session was presented live at the CSA Research Summit on March 9th, 2022. For full event details, please visit www.csaresearchsummit.com.
-
Why Quantum Networks, Why Now?
By:
Type: Talk
Experts estimate that quantum technology capable of breaking current encryption algorithms and intercepting communications will be possible no later than 2030. Due to the complexity of upgrading these systems, organizations in need of quantum-secure communication solutions should begin taking steps toward quantum-readiness now. Transformations of this magnitude require years of steady, focused implementation, but it’s hard to know what steps to take while the technology is still emerging. By starting now, you can stay ahead of the disruption that quantum computing will create as it reaches full potential. In this webinar you will learn: The emergent security threats of quantum computing The capabilities of entanglement-based quantum networks to create unhackable communications How multipurpose entanglement-based quantum networks will help you leverage quantum technology in the field Daniel Winton, Solutions Engineer at Aliro Quantum, will walk you through what you need to know in order to ensure your organization is meeting the security challenges and leveraging the benefits of the quantum revolution Quantum Networks provide defense-in-depth to protect sensitive data. Organizations who are on the cutting edge of digital transformation in their industries are investigating how to plan, design, and implement Quantum Networks. Aliro Quantum webinars help you understand what to look for throughout your quantum journey.
-
Using Quantum Memories in Entanglement-based Networks
By:
Type: Talk
Quantum memories are an integral part of quantum networks, enabling the secure, efficient, and long-distance transmission of quantum information in a variety of applications. This webinar provides an exploration of quantum memories, their applications, and practical aspects of integrating them into entanglement-based network architectures. Join Michael Wood, Aliro Quantum CMO, for this presentation examining rapidly-developing quantum memory technologies. Business leaders and technologists will gain a foundational understanding of the roles quantum memories play in entanglement-based network applications. In this webinar you’ll learn: - What a quantum memory is and what it does - The different types of quantum memories, and which are best suited for use in entanglement-based networks - Applications enabled by quantum memories - and their role in an entanglement-based network - The future of quantum memory development and their use in entanglement-based networks Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
Entanglement-based Networks for Increasing Quantum Computing Performance
By:
Type: Talk
Entanglement-based networks are redefining the fields of computation, communication, and cryptography, and reshaping the landscape of technological innovation. These networks form the infrastructure of increased quantum computing power: from linking Quantum Processing Units and accelerating quantum computing innovation, to facilitating Blind Quantum Computing in which users perform quantum computations on a remote quantum server while all inputs, algorithms, and results are kept private, even from the server itself. Join Eric Ostby, CPO at Aliro Quantum, for a comprehensive look at how entanglement-based networks can be used to increase the performance of quantum computers and why this approach is necessary on the path to developing powerful quantum computing capabilities. Business leaders and technologists will gain a practical understanding of entanglement-based quantum networking and quantum computing. In this webinar you’ll learn: - The foundations of quantum computing and its advantages over classical systems - The role of entanglement-based quantum networks in amplifying quantum computing power - The two types of quantum computer networking, Cluster vs Distributed Quantum Computing, and how they differ in their applications and networking requirements. - Answer the question “When will entanglement-based networking be needed to scale quantum computing?” - The future landscape of quantum computing, and the advancements and potential of entanglement-based networks for further enhancing performance. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum networking solutions today. This webinar will help prepare you to navigate the quantum future.
-
Qubits: Understanding Quantum Information
By:
Type: Talk
Quantum technologies use quantum bits (qubits) to perform computations, manipulate information, and to send and receive data. While similar in functionality to classical bits, qubits are fundamentally different. Join Michelle Chalupnik, Research Software Engineer at Aliro Quantum, as she walks us through the different types of qubits and the fundamentals of how qubits are used in a quantum network. In this webinar you will learn: - The pros and cons of different types of qubits - How qubits are encoded - The role of transducers in a quantum network - How to address quantum errors - How qubits travel through a quantum network Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
What is Q-Day?
By:
Type: Talk
In a few years, quantum computers will be able to break the encryption we use every day to keep our online communications private and secure. The day quantum computers will be capable of taking such actions is commonly referred to as Q-Day. Q-Day poses a threat to infrastructure such as water, energy and electricity, in addition to services such as health, safety, security, and national defense. Join Michael Cubeddu, Co-Founder at Aliro Quantum, as he speaks in detail on exactly what organizations should know about Q-Day, what infrastructure vulnerabilities to take into account, and the steps that can be taken now to safeguard against quantum and classical attacks. In this webinar you will learn: What is Q-Day and what impact will it have on critical infrastructure and industry verticals The most likely path to Q-Day and how quantum computers will break the current cryptography we rely on, how we know this is a real threat, and what the estimated timelines look like Which encryption schemes will be made ineffective by a cryptographically-relevant quantum computer or network of quantum computers and why How a quantum networking solution enables scalable, multi-vendor Quantum Secure Communication channels and why it’s the ideal, sustainable solution Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
Standardized Protocols for Quantum Network Management: Harnessing YANG and NETCONF
By:
Type: Talk
As quantum networks grow in complexity, the need for efficient, standardized network management becomes crucial. YANG, a data modeling language, and NETCONF, a network configuration protocol, provide robust solutions for managing classical and quantum network devices. This webinar explores how these technologies are being adapted to quantum systems, emphasizing their role in quantum network orchestration. In this webinar, you will learn: >> What NETCONF and YANG are >> Why YANG/NETCONF are important >> Recommendations for research labs This session is essential for quantum network engineers, telecom professionals, and quantum researchers interested in the intersection of classical and quantum network management! Organizations who are preparing their businesses and connectivity for the advent of powerful quantum computing are investigating how to plan, design, and implement entanglement-based secure networking solutions today. This webinar will help you prepare for upcoming advancements in quantum computing.
-
Real World Quantum Networking Deployments
By:
Type: Talk
Quantum Networks may sound like a futuristic technology, but entanglement-based quantum networks are being deployed in Local Area Networks, Metropolitan Area Networks, and in some cases as Wide Area Networks today. In this webinar, Michael Gaffney (Head of Public Sector at Aliro Quantum) and Daniel Winton (Solutions Engineer at Aliro Quantum) walk you through a variety of real world quantum network deployments that are being built today. We’ll cover: - Several use cases / case studies of real world quantum networks - The processes required for implementing quantum networks - The topology and technology timelines of deployment Organizations who are on the cutting edge of digital transformation in their industries are investigating how to plan, design, and implement Quantum Networks. Aliro Quantum webinars help you understand what to look for as you begin your quantum journey.
-
How does quantum entanglement work inside a Quantum Network?
By:
Type: Talk
The day a quantum computer is capable of cracking the encryption we use everyday to keep our communications secure - from email to financial transactions - is referred to as Q Day. On Q Day, the encryption we rely on to keep our sensitive data secure will be broken. Quantum Secure Communication is absolutely vital to preventing the potentially catastrophic impact of Q Day. Quantum Secure Communication uses entanglement to transmit information securely without exposing the information to the network. Entanglement can also be used to network quantum computers and distributed quantum sensors for increased performance. Join Daniel Winton, Solutions Engineer at Aliro Quantum, as he explores in detail the science and application of quantum entanglement. We’ll cover the attributes of quantum entanglement and its application in quantum networking. In this webinar you will learn: - How entanglement works in a Quantum Secure Communications system - How teleportation works - How entanglement swapping is performed - Why using entanglement achieves maximum security in a network The next technology revolution will be quantum - and quantum networks are essential to the transformation. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement Quantum Networks today. This webinar will help prepare you to navigate the quantum future.
-
Quantum computing in action
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.
-
Certifying Quantum Resources in Network Infrastructure
By:
Type: Talk
Quantum technologies leverage quantum mechanics to provide advantages over classical technology. However, as humans, we observe a classical world. How do we know that quantum mechanics exists in nature? And how can we test a network to be quantum? The answers to these questions are essential to witnessing quantum advantage and securing entanglement-based communications. Join Brian Doolittle, Quantum Physicist at Aliro Quantum, for an exploration of how quantum foundations inform methods for testing quantum networks and devices. In this webinar you will learn: - The fundamentals and phenomenology of quantum physics. - How quantum mechanics was shown to describe nature and its implications. - How networks can be tested to be quantum by witnessing nonclassicality. - How nonclassicality demonstrates quantum advantage in networks. - How security can be established in entanglement-based networks. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement Quantum Networks today. This webinar will help prepare you to navigate the quantum future.
-
Orchestration of Quantum Networks
By:
Type: Talk
Quantum networks are made up of many complex components operating in conjunction to create quantum communication channels for networking of quantum sensors, interconnecting quantum computers, and facilitating Quantum Secure Communication. Precise, scalable management of quantum networks will be necessary for effective and efficient quantum networking capable of scaling these quantum technologies. In this webinar, Kent Watsen, Software Architect at Aliro Quantum will explore quantum network management, share insights into the intricacies of quantum network orchestration, and highlight critical factors to consider when selecting orchestration software. Join this webinar for: - A brief history of the field - Essential terminology and taxonomy specific to quantum networking - What to look for in orchestration software for quantum networking - Functional and non-functional requirements for orchestration in quantum networks Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement Quantum Networks today. This webinar will help prepare you to navigate the quantum future.
-
Back to Security in the Quantum Era
By:
Type: Video
Our current cybersecurity infrastructure is under attack. The future arrival of the quantum computer compels us to revamp our security solutions. Members of the Quantum-Safe Security (QSS) working group of the CSA will discuss the issues and present the most recent developments in both post-quantum cryptography and quantum cryptography. To address the quantum threat promptly, we believe that awareness is paramount. It is well known that a well-planned project should involve 80 % preparation and 20% implementation. Therefore, every decision-maker in companies and organizations should at least start the reflection and preparation stage. This panel aims to bring you up to date with the quantum threat and the possible solutions. Questions and comments from the audience are encouraged
-
Quantum Network Simulator Demo
By:
Type: Talk
Quantum network simulation is foundational to the success of any quantum network implementation. In this session, Eric Brown, Head of Simulation at Aliro Quantum, discusses how a Quantum Network Simulator informs the planning and designing of quantum networks and what to look for in a simulator. Eric will also demonstrate a Quantum Network Simulator. Business leaders and technologists will gain a comprehensive understanding of Quantum Networking Simulation. You’ll learn: - What a simulator is for and why you need one - What to look for in a Quantum Network Simulator - The levels of abstraction you’ll see in a simulator - How to use different levels of abstraction to plan with your Quantum Network Simulator - What to do with information from your Quantum Network Simulator The next technology revolution will be quantum - and quantum networks are essential to the transformation. Organizations who are on the cutting edge of disrupting and transforming their industries are investigating how to plan, design, and implement Quantum Networks. This webinar will prepare you for navigating the quantum future.
-
Quantum-safe IPsec: A Hands-On Technical Guide
By:
Type: Talk
Quantum computing poses a significant threat to current cryptographic protocols, including those used in IPsec. By learning how to implement quantum-safe measures like PQC and QKD/QSC, engineers can ensure their networks remain secure well into the future. Join Bruno Rijsman, Aliro Fellow, in this session that goes beyond theory to provide detailed, actionable steps for deploying quantum-safe IPsec. Engineers gain technical insights that they can directly apply to their work. In this webinar you will learn: - Which parts of IPsec are vulnerable to quantum attacks and why. - General approaches for making IPsec Quantum-Safe: PQC, QKD, QSC, SKA, … - Standardized protocol extensions to IPsec for making it quantum safe. - Practical examples of configuring and monitoring commercial and open source IPsec encryptors for quantum safety. - Other practical considerations when deploying Quantum-Safe IPsec. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
The Role of Quantum Teleportation in Entanglement-based Secure Networks
By:
Type: Talk
Quantum Secure Communication, as achieved by Entanglement-based Secure Networks, relies on the physics of teleportation. Join Michelle Chalupnik, Research Software Engineer at Aliro Quantum, as she unpacks the science and application of quantum teleportation in Entanglement-based Secure Networking. In this webinar you will learn: - What quantum teleportation is and why it's useful in quantum communication - How quantum teleportation is achieved in an Entanglement-Based Secure Network used for Quantum Secure Communications - The mathematics describing quantum teleportation and where it’s happening in an entanglement-based secure network The next technology revolution will be quantum - and quantum networks are essential to the transformation. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement Quantum Networks today. This webinar will help prepare you to navigate the quantum future.
-
Migrating to PQC– How NXP applied quantum security with Utimaco
By:
Type: Talk
The development of quantum computers is a promising technology for various use cases. However, quantum computing also poses a significant threat to cybersecurity. This is why companies and organizations that produce long-lived technologies and products need to migrate to Post Quantum Cryptography now! Just like NXP – a global acting semiconductor designer and manufacturer – has implemented secure firmware signing on its chips. Attend this session if you want to learn more about real-world applications of Post Quantum Cryptography, including: - Best practices and advice for migrating to PQC. - Case Study: How NXP are making their infrastructure quantum resistant with Utimaco. - Introduction to secure signing solutions with the CRYSTALS-Dilithium PQC algorithm - Utimaco’s solutions for post quantum security
-
Design, Visualize, and Troubleshoot Quantum Networks
By:
Type: Talk
Quantum networks continue to gain traction with public sector organizations and interest with security-sensitive enterprises. Given the sophistication of quantum networks, technology professionals need to understand how to design, simulate, visualize, and troubleshoot these networks before they commit to purchasing devices and software. Join Michelle Fernandez, Member of Technical Staff with Aliro Quantum, as she demonstrates several examples of quantum network design necessary to build entanglement-based quantum networks. Michelle will show how each of these is designed, describe what protocols are necessary for each design, run the actual simulation of these designs, visualize the results, and troubleshoot potential problems. In this webinar you will learn: - What a few common examples are of quantum network designs - How entanglement, swapping, and fiber optic parameters can be simulated - How to run a quantum network design simulation and visualize the results - What approaches to take with the results to root cause design problems Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
Distributed Quantum Computing (DQC): from Simulation to Scaling
By:
Type: Talk
While Google’s Willow chip represents a giant leap in quantum computing capabilities, Quantum Processing Units (QPUs) remain constrained in size and computational power. While the advancements in error correction and computational power seen in chips like Willow are vital, they underscore the need for innovative approaches to scale quantum computing further. Distributed Quantum Computing (DQC) enables multiple quantum processors to work together, leveraging entanglement-based networks to perform complex computations collaboratively. Join Keith Kenemer, Research Software Engineer at Aliro, for a high-level exploration of Distributed Quantum Computing (DQC). In this webinar you will learn: - What is DQC and why is it important? - Why a quantum network simulator is necessary for this work - Why GPU acceleration is sometimes required for simulation - Relevant large-scale simulation resources such as: cloud compute resources; NVIDIA resources; alternative state formalisms and computational paradigms Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
Design and Emulation: the 1st Stage of Implementing Quantum Networks
By:
Type: Talk
There are 3 key stages to launching a Quantum Network: Design and Emulation, Pilot and Trial, and Full Scale Deployment. In this session, Eric Brown, Head of Simulation at Aliro Quantum, shares details of the Design and Emulation stage. Business leaders and technologists will gain a comprehensive understanding of the first stage to implementing Quantum Networking. In this webinar you will learn: – How most organizations begin their quantum networking journey – The steps to designing and then simulating your quantum network – What pitfalls to watch out for as you begin designing your quantum network and continue your quantum journey – How to know when you’re ready to move from the Design and Emulation stage to the Pilot and Trial stage The next technology revolution will be quantum - and quantum networks are essential to the transformation. Organizations who are on the cutting edge of disrupting and transforming their industries are investigating how to plan, design, and implement Quantum Networks. This webinar will prepare you for navigating the quantum future.
-
Computer Weekly – 3 October 2023: Where next for quantum computing?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.
-
Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
-
Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.
-
Computer Weekly - 14 December 2021: The rules for a safer internet
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
-
Building A Quantum Network In 3 stages
By:
Type: Talk
Highlighting the key stages of launching a quantum network: design and emulation, pilot and trial, and full scale deployment. We’ll share the details you need to be aware of at each of these stages - so you’ll know what to expect and what to watch out for throughout the entire process, from start to finish. Presented by Cara Alexander, Product Manager with Aliro Quantum. Business leaders and technologists will gain an actionable understanding of how the three stage approach to Quantum Networking will address their challenges. In this webinar you will learn: – The three stages of a quantum network implementation – How most organizations begin their quantum networking journey – How to know when you are ready to transition to each successive stage – What full scale quantum network implementation looks like – What pitfalls to watch out for as you begin and continue your quantum journey The next technology revolution will be quantum - and quantum networks are essential to the transformation. Quantum Networks will provide defense-in-depth to protect sensitive data, transform how Quantum Computers scale to full potential, and empower distributed Quantum Sensing with unparalleled accuracy. Organizations who are on the cutting edge of disrupting and transforming their industries are investigating how to plan, design, and implement Quantum Networks.
-
The Evolution of Network Security: Bridging Classical and Quantum Systems
By:
Type: Talk
In an era where data security is paramount, understanding the interplay between cutting-edge physics-based security methods and classical security protocols is crucial. With a basic understanding of quantum mechanics, attendees will explore the intricacies of physics-based security, such as Quantum Teleportation and Quantum Secure Communication (QSC), and their relationship with classical security systems like Post-Quantum Cryptography (PQC), and the One-Time Pad (OTP). In this webinar, Keith Kenemer, Research Software Engineer at Aliro Quantum, walks through the interplay between classical, math-based security and emergent physics-based security for the Quantum Era. In this webinar, you’ll learn: - Classical/algorithmic security methods & vulnerabilities to quantum attacks: where we are today - Quantum physics-based security & quantum networking protocols - Hybrid Classical + Quantum security (QKD) - Future security & privacy in the Quantum Era The convergence of physics-based and classical security systems will shape the landscape of data protection, with implications for various industries, from finance to national security. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement Quantum Networks today. This webinar will help prepare you to navigate the quantum future.
-
Beam Splitters in Quantum Networks
By:
Type: Talk
Beam Splitters are a simple yet powerful tool in quantum information and for quantum networks. A photon enters a beam splitter, and has a probability of being transmitted and a probability of being reflected. From a simple object like a beam splitter, entanglement can be generated from Bell state measurements and interferometry can be performed. Join Michelle Chalupnik, Research Software Engineer at Aliro, for an exploration of beam splitters, their uses, and how they can provide a mathematical model for many quantum processes. In this webinar, you'll learn: >> What a beam splitter is and what it is used for in quantum networks. >> How to represent the actions of a beam splitter via Jones calculus and via operator representation. >> How to use a beam splitter to model transduction noise. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.
-
Quantum Sensing and Metrology: Ultra-precise measurement through quantum mechanics
By:
Type: Talk
By harnessing the properties of quantum mechanics, quantum sensors are able to perform ultra-precise detection and measurement of electromagnetic fields, time, gravitational forces, and more. This field of quantum technology is driving innovations across key sectors including healthcare, navigation, telecommunications, and environmental science. Join Brian Doolittle, Quantum Physicist at Aliro, in this overview of the fundamental mechanisms of quantum sensors and their value to science and technology. In this webinar, you will learn: - The fundamentals and benefits of quantum sensing and metrology. - Key applications of quantum sensing used in science and technology today. - How quantum sensing and metrology might be applied in the future. Attendees will gain insights into the state-of-the-art advancements and the growing landscape of quantum sensing and metrology technologies.
-
Protecting Devices and Data with Quantum Safe Cryptography
By:
Type: Video
With the arrival of quantum computers on the horizon, Bart Stevens provides perspectives of the consequences for digital security. In this presentation, he’ll discuss: - Overview of the quantum computing security threat - New quantum safe cryptographic algorithms - Preparing for a quantum future: strategies and considerations for a quantum safe SoC design