Quantum Computing
PostQuantum.com by Marin Ivezic – Quantum Computing, Quantum Technologies, Post-Quantum
-
Why I Founded Applied Quantum – The First Pure-Play, End-to-End Quantum Consultancy
Applied Quantum is a firm that for the first time would be 100% dedicated to quantum technology services – not as a sideline, not as one emerging tech practice among many, but as the entire mission of the company, and it would cover the field end-to-end. We founded Applied Quantum…
Read More » -
How Quantum Could Break Through Amdahl’s Law and Computing’s Limits
Amdahl’s Law teaches us a humbling lesson about the limits of classical computing: there is always a portion that resists parallel speedup, chaining us to diminishing returns. We’ve coped by clever engineering – making that chain as short as possible – but not broken it. Quantum computing offers a bolt…
Read More » -
Quantum Technologies and Quantum Computing in South Korea
South Korea’s quantum technology ecosystem has rapidly matured from obscurity into a well-organized force. Backed by a clear national strategy and increasing investments, Korea is making its mark through cutting-edge research at top universities, substantial government support for quantum computing and communications, and active participation from industry giants and startups…
Read More » -
Quantum Technologies and Quantum Computing in the Middle East
Leaders in the Middle East are talking about quantum algorithms and national quantum computing hubs. And even about Quantum AI. The Middle East is determined not to miss out on the quantum revolution, and that determination is reshaping the tech narrative of this region. What’s behind this quantum push in…
Read More » -
The Race Toward FTQC: Ocelot, Majorana, Willow, Heron, Zuchongzhi
Quantum computing is entering a new phase marked by five major announcements from five quantum powerhouses—Amazon Web Services (AWS), Microsoft, Google, IBM, and Zuchongzhi—all in the last 4 months. Are these just hype-fueled announcements, or do they mark real progress toward useful, large-scale, fault-tolerant quantum computing—and perhaps signal an accelerated timeline…
Read More » -
Quantum Geopolitics: The Global Race for Quantum Computing
Quantum computing has emerged as a new frontier of great-power competition in the 21st century. Nations around the world view advanced quantum technologies as strategic assets—keys to future economic prowess, military strength, and technological sovereignty. Governments have already poured over $40 billion into quantum research and development globally, launching national…
Read More » -
Quantum Use Cases in Telecom
Quantum computing’s impact on global telecommunications will be transformative. It holds the potential to revolutionize how we secure and operate networks, enabling levels of performance and protection previously unattainable. At the same time, it forces a reckoning with the vulnerabilities of our current systems. The journey to fully realize quantum-enhanced…
Read More » -
Quantum Use Cases in Healthcare & Medical Research
Quantum computing has the potential to reshape global healthcare and medical research in the coming decades. From our current vantage point, we can see glimmers of its future impact: prototype quantum algorithms already accelerating drug discovery, early collaborations bringing quantum hardware into hospital research labs, and quantum-inspired methods optimizing healthcare…
Read More » -
China’s Quantum Computing and Quantum Technology Initiatives
For the world at large, China’s quantum leap is a call to action. It challenges other nations to invest in innovation and pushes the envelope of what’s possible. In an optimistic view, this competition can accelerate discoveries that benefit all humankind – better medicines from quantum simulations, safer communications, more…
Read More » -
Quantum Technology Initiatives in Singapore and ASEAN
ASEAN’s journey in quantum technology is relatively recent but steadily gaining momentum. Singapore took the lead in the early 2000s – the National Research Foundation began funding quantum research as early as 2002, and by 2007 the government helped establish the Centre for Quantum Technologies (CQT) at the National University…
Read More » -
Quantum Technologies and Quantum Computing in Russia
Leaders in the Middle East are talking about quantum algorithms and national quantum computing hubs. And even about Quantum AI. The Middle East is determined not to miss out on the quantum revolution, and that determination is reshaping the tech narrative of this region. What’s behind this quantum push in…
Read More » -
Quantum Computing Benchmarks: RCS, QV, AQ, and More
As quantum computing hardware rapidly improves, simple metrics like qubit count are no longer sufficient to gauge a system’s true capability. Unlike classical computers where transistor counts roughly correlate with performance, quantum bits (qubits) can be error-prone and short-lived, so a few high-fidelity qubits can be more valuable than many…
Read More » -
Adiabatic Quantum (AQC) and Cyber (2024 Update)
Adiabatic Quantum Computing (AQC) is an alternative paradigm that uses an analog process based on the quantum adiabatic theorem. Instead of discrete gate operations, AQC involves slowly evolving a quantum system’s Hamiltonian such that it remains in its lowest-energy (ground) state, effectively “computing” the solution as the system’s final state.…
Read More » -
Quantum Technology Initiatives in Europe and EU
Europe’s quantum technology landscape has evolved from disparate academic projects into a coordinated multi-billion euro endeavor encompassing the EU and its member states. The historical commitment to quantum science is now manifesting in tangible outputs: prototype quantum computers in laboratories and supercomputing centers, quantum-secure communication testbeds linking cities, and quantum…
Read More » -
Quantum Hacking: Cybersecurity of Quantum Systems
While these machines are not yet widespread, it is never too early to consider their cybersecurity. As quantum computing moves into cloud platforms and multi-user environments, attackers will undoubtedly seek ways to exploit them.
Read More »