-
AI Security
AI Uses Today – Far More Than You Might Think
Ask people on the street how much AI uses today affect their lives, and most would probably answer that it doesn’t affect them right now. Some might say that it’s pure science fiction. Others might say that it may affect…
Read More » -
Society 5.0
The Future of Privacy in our Smart Living
It is inevitable and important that human society moves towards a smarter way of living. We must use intelligent ways to improve our infrastructure and its dependencies. To do this we have to share our personal information, from direct to…
Read More » -
Leadership
The Future of Leadership in the Age of AI – Preface
Today’s business leadership face a conundrum. Artificial Intelligence (AI) unquestionably will play an enormous role in the future of their organizations and the business environment in which they operate, but what effects will it have? Prognosticators have wildly different visions…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability D.3: Continuous Operation (Long-Duration Stability)
One of the most critical requirements for a cryptographically relevant quantum computer (CRQC) is continuous operation - the ability to run a complex quantum algorithm non-stop for an extended period (on the order of days) without losing quantum coherence or…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability D.1: Full Fault-Tolerant Algorithm Integration
Imagine a quantum computer that can execute an entire algorithm start-to-finish with errors actively corrected throughout. Full fault-tolerant algorithm integration is exactly that: the orchestration of all components - stable logical qubits, high-fidelity gates, error-correction cycles, ancilla factories, measurements, and…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability D.2: Decoder Performance (Real‑Time Error Correction Processing)
In a fault-tolerant quantum computer, qubits are continuously monitored via stabilizer measurements (producing “syndrome” bits) to detect errors. The decoder is a classical algorithm (running on specialized hardware) that takes this rapid stream of syndrome data and figures out which…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability C.2: Magic State Production & Injection (Non-Clifford Gates)
Magic states are an essential “extra ingredient” for universal quantum computing, often metaphorically likened to a magic catalyst enabling otherwise impossible operations. Quantum algorithms require not only robust qubits and error correction, but also a way to perform non-Clifford gates…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability C.1: High-Fidelity Logical Clifford Gates
Cryptographically Relevant Quantum Computers (CRQCs) will rely on a suite of core capabilities - and high-fidelity logical Clifford gates are among the most essential. This capability refers to performing the fundamental set of quantum logic operations (the Clifford gates: Pauli…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability B.3: Below-Threshold Operation & Scaling
“Below-threshold operation” refers to running a quantum processor at error rates below the critical threshold of a quantum error-correcting code. In simple terms, there is a tipping point in error rates: if each quantum gate and qubit has an error…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability B.2: Syndrome Extraction (Error Syndrome Measurement)
Quantum syndrome extraction - also called error syndrome measurement - is the process of measuring collective properties of qubits to detect errors without destroying the encoded quantum information. It is essentially the sensor mechanism of a quantum error-correcting code, analogous…
Read More » -
Post-Quantum, PQC, Quantum Security
Capability B.1: Quantum Error Correction (QEC)
Quantum Error Correction (QEC) is the first and arguably most critical capability in the roadmap toward a cryptographically relevant quantum computer (CRQC). Without QEC, a large-scale quantum computer cannot reliably perform the billions of operations needed to break modern encryption…
Read More » -
Cyber-Kinetic Security
Stuxnet and the Birth of Cyber-Kinetic Weapons
Stuxnet was the first true cyber-kinetic weapon, designed to cripple the Iranian – and perhaps also the North Korean – nuclear weapon programs. It succeeded in slowing the Iranian program, although it was discovered before it could deal the program…
Read More » -
Leadership
Leadership in the Age of Artificial Intelligence (AI)
AI’s effect on the workplace will not be limited merely to repetitive, production line-type jobs. Increasingly, it also enters the realm of highly trained knowledge workers. It will also affect those who manage workers currently employed in such jobs. AI…
Read More » -
5G Security
How Telecom Operators Can Strike Back with IoT, Fog & Cyber
Telecom operators sat back as the new over-the-top (OTT) service providers, internet and tech companies slowly ate away at their business, particularly in the B2C space. A combination of institutional laziness and poor execution on promising initiatives gave these new…
Read More » -
Cyber-Kinetic Security
Navigating a Safe Course Through Maritime Cyberattacks
The open seas have long attracted those who yearned for adventure. The risk of pitting oneself against a vast and unforgiving sea has tested sailors’ mettle for millennia. It’s not surprising that the maritime industry is one that thrives on…
Read More »