Page 11«..10111213..2030..»

JPMorgan is creating its own cryptocurrency – CNN

‘ : “”},a.getDefinedParams = function(n, e) {return e.filter((function(e) {return n[e]})).reduce((function(e, t) {return r(e, (function(e, t, n) {t in e ? Object.defineProperty(e, t, {value: n,enumerable: !0,configurable: !0,writable: !0}) : e[t] = n;return e})({}, t, n[t]))}), {})},a.isValidMediaTypes = function(e) {var t = [“banner”, “native”, “video”];if (!Object.keys(e).every((function(e) {return (0,u.default)(t, e)})))return !1;if (e.video && e.video.context)return (0,u.default)([“instream”, “outstream”], e.video.context);return !0},a.getBidderRequest = function(e, t, n) {return (0,o.default)(e, (function(e) {return 0 > t / 4).toString(16) : ([1e7] + -1e3 + -4e3 + -8e3 + -1e11).replace(/[018]/g, e)},a.getBidIdParameter = function(e, t) {return t && t[e] ? t[e] : “”},a.tryAppendQueryString = function(e, t, n) {return n ? e + (t + “=”) + encodeURIComponent(n) + “&” : e},a.parseQueryStringParameters = function(e) {var t = “”;for (var n in e)e.hasOwnProperty(n) && (t += n + “=” + encodeURIComponent(e[n]) + “&”);return t},a.transformAdServerTargetingObj = function(t) {return t && 0 ‘;return t += ”},a.createTrackPixelIframeHtml = function(e) {var t = !(1 n ‘) : “”},a.getIframeDocument = function(e) {if (e) {var t = void 0;try {t = e.contentWindow ? e.contentWindow.document : e.contentDocument.document ? e.contentDocument.document : e.contentDocument} catch (e) {a.logError(“Cannot get iframe document”, e)}return t}},a.getValueString = function(e, t, n) {return null == t ? n : a.isStr(t) ? t : a.isNumber(t) ? t.toString() : void a.logWarn(“Unsuported type for param: ” + e + ” required type: String”)};a.getHighestCpm = U(“timeToRespond”, (function(e, t) {return t = u.syncsPerBidder)return c.logWarn(‘Number of user syncs exceeded for “‘ + t + ‘”‘);if (u.filterSettings) {if (function(e, t) {var n = u.filterSettings;if (function(e, t) {if (e.all && e[t])return c.logWarn(‘Detected presence of the “filterSettings.all” and “filterSettings.’ + t + ‘” in userSync config. You cannot mix “all” with “iframe/image” configs; they are mutually exclusive.’),!1;var n = e.all ? e.all : e[t], r = e.all ? “all” : t;if (!n)return !1;var i = n.filter, o = n.bidders;if (i && “include” !== i && “exclude” !== i)return c.logWarn(‘UserSync “filterSettings.’ + r + “.filter” setting ‘” + i + “‘ is not a valid option; use either ‘include’ or ‘exclude’.”),!1;return !!(“*” === o || Array.isArray(o) && 0 n n n prebid.org wrappern n ” + (n ? “” : “”) + “n n n n “),ttlseconds: Number(e.ttl)}}},23: function(e, t) {var n = {}.toString;e.exports = function(e) {return n.call(e).slice(8, -1)}},24: function(e, t) {e.exports = function(e) {if (null == e)throw TypeError(“Can’t call method on ” + e);return e}},25: function(e, t, n) {var r = n(60)(“wks”), i = n(62), o = n(19).Symbol, a = “function” == typeof o;(e.exports = function(e) {return r[e] || (r[e] = a && o[e] || (a ? o : i)(“Symbol.” + e))}).store = r},26: function(e, t) {e.exports = function() {}},27: function(e, t, n) {“use strict”;Object.defineProperty(t, “__esModule”, {value: !0}),t.default = function(e) {var t = e;return {callBids: function() {},setBidderCode: function(e) {t = e},getBidderCode: function() {return t}}}},28: function(e, t, n) {“use strict”;var r, i = n(7), o = (r = i) && r.__esModule ? r : {default: r}, a = (function(e) {{if (e && e.__esModule)return e;var t = {};if (null != e)for (var n in e)Object.prototype.hasOwnProperty.call(e, n) && (t[n] = e[n]);return t.default = e,t}})(n(0));var d = {}, u = [“criteo”];function s(e, t) {var n = document.createElement(“script”);n.type = “text/javascript”,n.async = !0,t && “function” == typeof t && (n.readyState ? n.onreadystatechange = function() {“loaded” !== n.readyState && “complete” !== n.readyState || (n.onreadystatechange = null,t())}: n.onload = function() {t()}),n.src = e;var r = document.getElementsByTagName(“head”);(r = r.length ? r : document.getElementsByTagName(“body”)).length && (r = r[0]).insertBefore(n, r.firstChild)}t.loadExternalScript = function(e, t) {if (t && e)if ((0,o.default)(u, t)) {if (!d[e]) {a.logWarn(“module ” + t + ” is loading external JavaScript”);var n = document.createElement(“script”);n.type = “text/javascript”,n.async = !0,n.src = e,a.insertElement(n),d[e] = !0}} else a.logError(t + ” not whitelisted for loading external JavaScript”);else a.logError(“cannot load external script without url and moduleCode”)},t.loadScript = function(t, e, n) {t ? n ? d[t] ? e && “function” == typeof e && (d[t].loaded ? e() : d[t].callbacks.push(e)) : (d[t] = {loaded: !1,callbacks: []},e && “function” == typeof e && d[t].callbacks.push(e),s(t, (function() {d[t].loaded = !0;try {for (var e = 0; e t.max ? e : t}), {max: 0}), p = (0,v.default)(e.buckets, (function(e) {if (n > g.max * r) {var t = e.precision;void 0 === t && (t = y),i = (e.max * r).toFixed(t)} else if (n = e.min * r)return e}));return p && (t = n,a = r,d = void 0 !== (o = p).precision ? o.precision : y,u = o.increment * a,s = o.min * a,c = Math.pow(10, d + 2),f = (t * c – s * c) / (u * c),l = Math.floor(f) * u + s,i = (l = Number(l.toFixed(10))).toFixed(d)),i}function m(e) {if (o.isEmpty(e) || !e.buckets || !Array.isArray(e.buckets))return !1;var t = !0;return e.buckets.forEach((function(e) {void 0 !== e.min && e.max && e.increment || (t = !1)})),t}t.getPriceBucketString = function(e, t) {var n = 2 (0,S.timestamp)()},function(e) {return e && (e.status && !(0,A.default)([C.BID_STATUS.BID_TARGETING_SET, C.BID_STATUS.RENDERED], e.status) || !e.status)});function U(e, n) {var r = [], i = (0,S.groupBy)(e, “adUnitCode”);return Object.keys(i).forEach((function(e) {var t = (0,S.groupBy)(i[e], “bidderCode”);Object.keys(t).forEach((function(e) {return r.push(t[e].reduce(n))}))})),r}function u(n) {var g = {};function p(e) {return “string” == typeof e ? [e] : w.isArray(e) ? e : n.getAdUnitCodes() || []}function v() {return U(n.getBidsReceived().filter((function(e) {return “banner” !== e.mediaType || (0,a.sizeSupported)([e.width, e.height])})).filter(d).filter(t.isBidNotExpired), S.getOldestHighestCpmBid)}function y() {return n.getStandardBidderAdServerTargeting().map((function(e) {return e.key})).concat(R).filter(S.uniques)}function m(r, i, e, t) {return Object.keys(i.adserverTargeting).filter(o()).forEach((function(e) {var t, n;r.length && r.filter((n = e,function(e) {return e.adUnitCode === i.adUnitCode && e.adserverTargeting[n]})).forEach((t = e,function(e) {w.isArray(e.adserverTargeting[t]) || (e.adserverTargeting[t] = [e.adserverTargeting[t]]),e.adserverTargeting[t] = e.adserverTargeting[t].concat(i.adserverTargeting[t]).filter(S.uniques),delete i.adserverTargeting[t]}))})),r.push(i),r}function o() {var t = y();return function(e) {return -1 === t.indexOf(e)}}function b(t) {return _({}, t.adUnitCode, Object.keys(t.adserverTargeting).filter(o()).map((function(e) {return _({}, e.substring(0, O), [t.adserverTargeting[e]])})))}return g.resetPresetTargeting = function(e) {if ((0,S.isGptPubadsDefined)()) {var t = p(e), r = n.getAdUnits().filter((function(e) {return (0,A.default)(t, e.code)}));window.googletag.pubads().getSlots().forEach((function(n) {B.forEach((function(t) {r.forEach((function(e) {e.code !== n.getAdUnitPath() && e.code !== n.getSlotElementId() || n.setTargeting(t, null)}))}))}))}},g.getAllTargeting = function(e) {var r, t, i, n, o, a, d, u, s, c = 1 i && (r = !1)),!r})),r && e.run(),r}function u(e, t) {void 0 === e[t] ? e[t] = 1 : e[t]++}},addWinningBid: function(e) {o = o.concat(e),R.callBidWonBidder(e.bidder, e, f)},setBidTargeting: function(e) {R.callSetTargetingBidder(e.bidder, e)},getWinningBids: function() {return o},getTimeout: function() {return E},getAuctionId: function() {return m},getAuctionStatus: function() {return b},getAdUnits: function() {return s},getAdUnitCodes: function() {return l},getBidRequests: function() {return g},getBidsReceived: function() {return p}}},t.auctionCallbacks = W,t.getStandardBidderSettings = d,t.getKeyValueTargetingPairs = V,t.adjustBids = s;var _ = n(0), h = n(31), i = n(17), S = n(228), E = n(12), w = n(3), r = n(18), o = n(20), T = a(n(10)), C = a(n(7)), A = n(41);function a(e) {return e && e.__esModule ? e : {default: e}}var B = r.userSync.syncUsers, O = n(0), R = n(8), U = n(9), N = n(4), D = t.AUCTION_STARTED = “started”, j = t.AUCTION_IN_PROGRESS = “inProgress”, P = t.AUCTION_COMPLETED = “completed”;U.on(N.EVENTS.BID_ADJUSTMENT, (function(e) {s(e)}));var k = 4, x = {}, M = {}, G = [];var q = t.addBidResponse = (0,o.createHook)(“asyncSeries”, (function(e, t) {this.auctionAddBidResponse(e, t)}), “addBidResponse”);function W(e, p) {var v = 0, t = !1, n = (0,_.delayExecution)((function() {t = !0}), p.getBidRequests().length);function y() {v–,t && 0 === v && e()}return {addBidResponse: function(e, t) {v++;var n = p.getBidRequests(), r = p.getAuctionId(), i = (0,_.getBidderRequest)(n, t.bidderCode, e), o = (function(e) {var t = e.adUnitCode, n = e.bid, r = e.bidRequest, i = e.auctionId, o = r.start, a = b({}, n, {auctionId: i,responseTimestamp: (0,_.timestamp)(),requestTimestamp: o,cpm: parseFloat(n.cpm) || 0,bidder: n.bidderCode,adUnitCode: t});a.timeToRespond = a.responseTimestamp – a.requestTimestamp,U.emit(N.EVENTS.BID_ADJUSTMENT, a);var d = r.bids && (0,T.default)(r.bids, (function(e) {return e.adUnitCode == t})), u = d && d.renderer;u && u.url && (a.renderer = E.Renderer.install({url: u.url}),a.renderer.setRender(u.render));var s, c = w.config.getConfig(“mediaTypePriceGranularity.” + n.mediaType), f = (0,h.getPriceBucketString)(a.cpm, “object” === (void 0 === c ? “undefined” : m(c)) ? c : w.config.getConfig(“customPriceBucket”), w.config.getConfig(“currency.granularityMultiplier”));return a.pbLg = f.low,a.pbMg = f.med,a.pbHg = f.high,a.pbAg = f.auto,a.pbDg = f.dense,a.pbCg = f.custom,a.bidderCode && (0 e.getTimeout() + w.config.getConfig(“timeoutBuffer”) && e.executeCallback(!0)}function z(e, t) {U.emit(N.EVENTS.BID_RESPONSE, t),e.addBidReceived(t),I(e, t)}function d(e) {var t = w.config.getConfig(“mediaTypePriceGranularity.” + e), n = “string” == typeof e && t ? “string” == typeof t ? t : “custom” : w.config.getConfig(“priceGranularity”), r = pbjs.bidderSettings;return r[N.JSON_MAPPING.BD_SETTING_STANDARD] || (r[N.JSON_MAPPING.BD_SETTING_STANDARD] = {}),r[N.JSON_MAPPING.BD_SETTING_STANDARD][N.JSON_MAPPING.ADSERVER_TARGETING] || (r[N.JSON_MAPPING.BD_SETTING_STANDARD][N.JSON_MAPPING.ADSERVER_TARGETING] = [{key: N.TARGETING_KEYS.BIDDER,val: function(e) {return e.bidderCode}}, {key: N.TARGETING_KEYS.AD_ID,val: function(e) {return e.adId}}, {key: N.TARGETING_KEYS.PRICE_BUCKET,val: function(e) {return n === N.GRANULARITY_OPTIONS.AUTO ? e.pbAg : n === N.GRANULARITY_OPTIONS.DENSE ? e.pbDg : n === N.GRANULARITY_OPTIONS.LOW ? e.pbLg : n === N.GRANULARITY_OPTIONS.MEDIUM ? e.pbMg : n === N.GRANULARITY_OPTIONS.HIGH ? e.pbHg : n === N.GRANULARITY_OPTIONS.CUSTOM ? e.pbCg : void 0}}, {key: N.TARGETING_KEYS.SIZE,val: function(e) {return e.size}}, {key: N.TARGETING_KEYS.DEAL,val: function(e) {return e.dealId}}, {key: N.TARGETING_KEYS.SOURCE,val: function(e) {return e.source}}, {key: N.TARGETING_KEYS.FORMAT,val: function(e) {return e.mediaType}}]),r[N.JSON_MAPPING.BD_SETTING_STANDARD]}function V(e, t) {if (!t)return {};var n = {}, r = pbjs.bidderSettings;r && (u(n, d(t.mediaType), t),e && r[e] && r[e][N.JSON_MAPPING.ADSERVER_TARGETING] && (u(n, r[e], t),t.sendStandardTargeting = r[e].sendStandardTargeting));return t.native && (n = b({}, n, (0,i.getNativeTargeting)(t))),n}function u(r, i, o) {var e = i[N.JSON_MAPPING.ADSERVER_TARGETING];return o.size = o.getSize(),O._each(e, (function(e) {var t = e.key, n = e.val;if (r[t] && O.logWarn(“The key: ” + t + ” is getting ovewritten”),O.isFn(n))try {n = n(o)} catch (e) {O.logError(“bidmanager”, “ERROR”, e)}(void 0 === i.suppressEmptyKeys || !0 !== i.suppressEmptyKeys) && t !== N.TARGETING_KEYS.DEAL || !O.isEmptyStr(n) && null != n ? r[t] = n : O.logInfo(“suppressing empty key ‘” + t + “‘ from adserver targeting”)})),r}function s(e) {var t = e.bidderCode, n = e.cpm, r = void 0;if (pbjs.bidderSettings && (t && pbjs.bidderSettings[t] && “function” == typeof pbjs.bidderSettings[t].bidCpmAdjustment ? r = pbjs.bidderSettings[t].bidCpmAdjustment : pbjs.bidderSettings[N.JSON_MAPPING.BD_SETTING_STANDARD] && “function” == typeof pbjs.bidderSettings[N.JSON_MAPPING.BD_SETTING_STANDARD].bidCpmAdjustment && (r = pbjs.bidderSettings[N.JSON_MAPPING.BD_SETTING_STANDARD].bidCpmAdjustment),r))try {n = r(e.cpm, b({}, e))} catch (e) {O.logError(“Error during bid adjustment”, “bidmanager.js”, e)}0 (eg mediaTypes.banner.sizes).”), e.sizes = n);if (t && t.video) {var i = t.video;if (i.playerSize)if (Array.isArray(i.playerSize) && 1 === i.playerSize.length && i.playerSize.every(d)) e.sizes = i.playerSize;else if (d(i.playerSize)) {var o = [];o.push(i.playerSize),w.logInfo(“Transforming video.playerSize from ” + i.playerSize + ” to ” + o + ” so it’s in the proper format.”),e.sizes = i.playerSize = o} else w.logError(“Detected incorrect configuration of mediaTypes.video.playerSize. Please specify only one set of dimensions in a format like: [[640, 480]]. Removing invalid mediaTypes.video.playerSize property from request.”), delete e.mediaTypes.video.playerSize}if (t && t.native) {var a = t.native;a.image && a.image.sizes && !Array.isArray(a.image.sizes) && (w.logError(“Please use an array of sizes for native.image.sizes field. Removing invalid mediaTypes.native.image.sizes property from request.”),delete e.mediaTypes.native.image.sizes),a.image && a.image.aspect_ratios && !Array.isArray(a.image.aspect_ratios) && (w.logError(“Please use an array of sizes for native.image.aspect_ratios field. Removing invalid mediaTypes.native.image.aspect_ratios property from request.”),delete e.mediaTypes.native.image.aspect_ratios),a.icon && a.icon.sizes && !Array.isArray(a.icon.sizes) && (w.logError(“Please use an array of sizes for native.icon.sizes field. Removing invalid mediaTypes.native.icon.sizes property from request.”),delete e.mediaTypes.native.icon.sizes)}})),e},h.callBids = function(e, t, r, i, o, a) {if (t.length) {var n = t.reduce((function(e, t) {return e[Number(void 0 !== t.src && t.src === C.S2S.SRC)].push(t),e}), [[], []]), d = b(n, 2), u = d[0], s = d[1];if (s.length) {var c = (0,E.ajaxBuilder)(a, o ? {request: o.request.bind(null, “s2s”),done: o.done} : void 0), f = U.bidders, l = R[U.adapter], g = s[0].tid, p = s[0].adUnitsS2SCopy;if (l) {var v = {tid: g,ad_units: p};if (v.ad_units.length) {var y = s.map((function(e) {return e.start = (0,S.timestamp)(),i})), m = v.ad_units.reduce((function(e, t) {return e.concat((t.bids || []).reduce((function(e, t) {return e.concat(t.bidder)}), []))}), []);w.logMessage(“CALLING S2S HEADER BIDDERS ==== ” + f.filter((function(e) {return (0,A.default)(m, e)})).join(“,”)),s.forEach((function(e) {B.emit(C.EVENTS.BID_REQUESTED, e)})),l.callBids(v, s, r, (function() {return y.forEach((function(e) {return e()}))}), c)}}}u.forEach((function(e) {e.start = (0,S.timestamp)();var t = R[e.bidderCode];w.logMessage(“CALLING BIDDER ======= ” + e.bidderCode),B.emit(C.EVENTS.BID_REQUESTED, e);var n = (e.doneCbCallCount = 0,E.ajaxBuilder)(a, o ? {request: o.request.bind(null, e.bidderCode),done: o.done} : void 0);t.callBids(e, r, i, n)}))} else w.logWarn(“callBids executed with no bidRequests. Were they filtered by labels or sizing?”)},h.videoAdapters = [],h.registerBidAdapter = function(e, t) {var n = (2 n

n

n

n

Read more from the original source:
JPMorgan is creating its own cryptocurrency – CNN

Read More..

Ask a Techspert: What is quantum computing? – blog.google

Editors Note: Do you ever feel like a fish out of water? Try being a tech novice and talking to an engineer at a place like Google. Ask a Techspert is a new series on the Keyword asking Googler experts to explain complicated technology for the rest of us. This isnt meant to be comprehensive, but just enough to make you sound smart at a dinner party.

Quantum computing sounds like something out of a sci-fi movie. But its real, and scientists and engineers are working to make it a practical reality. Google engineers are creating chips the size of a quarter that could revolutionize the computers of tomorrow. But what is quantum computing, exactly?

The Keywords very first Techspert is Marissa Giustina, a research scientist and quantum electronics engineer in our Santa Barbara office. We asked her to explain how this emerging technology actually works.

What do we need to know about conventional computers when we think about quantum computers?

At a first glance, information seems like an abstract concept. Sure, information can be stored by writing and drawinghumans figured that out a long time ago. Still, there doesnt seem to be anything physically tangible about the process of thinking.

Enter the personal computer. Its a machinea purely physical objectthat manipulates information. So how does it do that, if its a physical machine and information is abstract? Well, information is actually physical. Computers store and process rich, detailed information by breaking it down. At a low level, a computer represents information as a series of bits. Each bit can take a value of either [0] or [1], and physically, these bits are tiny electrical switches that can be either open [0] or closed [1]. Emails, photos and videos on YouTube are all represented by long sequences of bitslong rows of tiny electrical switches inside a computer.

The computer computes by manipulating those bits, like changing between [0] and [1] (opening or closing a switch), or checking whether two bits have equal or opposite values and setting another bit accordingly. These bit-level manipulations are the basis of even the fanciest computer programs.

Ones and zeros, like “The Matrix.” Got it. So then what is a quantum computer?

A quantum computer is a machine that stores and manipulates information as quantum bits, or qubits, instead of the classical bits we were talking about before. Quantum bits are good at storing and manipulating a different kind of information than classical bits, since they are governed by rules of quantum mechanicsthe same rules that govern the behavior of atoms and molecules.

Whats the difference between a bit and a qubit?

This is where it gets more complicated. Remember that a classical bit is just a switch: it has only two possible configurations: [open] or [closed]. A qubits configuration has a lot more possibilities. Physicists often think of a qubit like a little globe, with [0] at the north pole and [1] at the south pole, and the qubits configuration is represented by a point on the globe. In manipulating the qubit, we can send any point on the globe to any other point on the globe.

At first, it sounds like a qubit can hold way more information than a regular bit. But theres a catch: the rules of quantum mechanics restrict what kinds of information we can get out of a qubit. If we want to know the configuration of a classical bit, we just look at it, and we see that the switch is either open [0] or closed [1]. If we want to know the configuration of a qubit, we measure it, but the only possible measurement outcomes are [0] (north pole) or [1] (south pole). A qubit that was situated on the equator will measure as [0] 50 percent of the time and [1] the other 50 percent of the time. That means we have to repeat measurements many times in order to learn about a qubits actual configuration.

Here is the original post:
Ask a Techspert: What is quantum computing? – blog.google

Read More..

IBM hits quantum computing milestone, may see ‘Quantum …

IBM is outlining another milestone in quantum computing — its highest Quantum Volume to date — and projects that practical uses or so called Quantum Advantage may be a decade away.

Big Blue, which will outline the scientific milestone at the American Physical Society March Meeting, made a bit of a splash at CES 2019 with a display of its Q System quantum computer and has been steadily showing progress on quantum computing.

In other words, that quantum computing buying guide for technology executives may take a while. Quantum Volume is a performance metric that indicates progress in the pursuit of Quantum Advantage. Quantum Advantage refers to the point where quantum applications deliver significant advantages to classical computers.

Also:Meet IBM’s bleeding edge of quantum computingCNET

Quantum Volume is determined by the number of qubits, connectivity, and coherence time, plus accounting for gate and measurement errors, device cross talk, and circuit software compiler efficiency.

IBM said its Q System One, which has a 20-qubit processor, produced a Quantum Volume of 16, double the current IBM Q, which has a Quantum Volume of 8. IBM also said the Q System One has some of the lowest error rates IBM has measured.

That progress is notable, but practical broad use cases are still years away. IBM said Quantum Volume would need to double every year to reach Quantum Advantage within the next decade. Faster progress on Quantum Advantage would speed up that timeline. IBM has doubled the power of its quantum computers annually since 2017.

Once Quantum Advantage is hit, there would be new applications, more of an ecosystem and real business use cases. Consumption of quantum computing would still likely be delivered via cloud computing since the technology has some unique characteristics that make a traditional data center look easy. IBM made its quantum computing technology available in 2016 via a cloud service and is working with partners to find business and science use cases.

Here’show quantum computing and classic computing differsvia our recent primer on the subject.

Every classical electronic computer exploits the natural behavior of electrons to produce results in accordance with Boolean logic (for any two specific input states, one certain output state). Here, the basic unit of transaction is the binary digit (“bit”), whose state is either 0 or 1. In a conventional semiconductor, these two states are represented by low and high voltage levels within transistors.

In a quantum computer, the structure is radically different. Its basic unit of registering state is the qubit, which at one level also stores a 0 or 1 state (actually 0 and/or 1). Instead of transistors, a quantum computing obtains its qubits by bombarding atoms with electrical fields at perpendicular angles to one another, the result being to line up the ions but also keep them conveniently and equivalently separated. When these ions are separated by just enough space, their orbiting electrons become the home addresses, if you will, for qubits.

Go here to read the rest:
IBM hits quantum computing milestone, may see ‘Quantum …

Read More..

Its Time You Learned About Quantum Computing | WIRED

Youve probably heard of quantum computing. Do you understand it? Unlikely! Its time that you did.

The basic ideatap into quantum physics to make immensely powerful computersisnt new. Nobel-winning physicist Richard Feynman is generally credited with first suggesting that in 1982. But in the past few years the concept has started to become more real.

Google, IBM, Intel, Microsoft, and a pack of startups are all building and testing quantum computing hardware and software. Theyre betting that these machines will lead to breakthroughs in areas such as chemistry, materials science, logistical planning such as in factories, and perhaps artificial intelligence.

It will probably be years before the technology is mature enough to be broadly practical. But the potential gains are so large that companies such as JP Morgan and Daimler are already experimenting with early machines from IBM. And you dont have to be a giant bank or auto maker to play with quantum computing. Both IBM and Rigetti Computing, a startup that opened its own quantum computing factory last year, have launched services to help developers learn about and practice with quantum computing code.

So how do they work? You may have heard that the normal rules of reality dont always apply in the world of quantum mechanics. A phenomenon known as a quantum superposition allows things to kinda, sorta, be in two places at once, for example. In a quantum computer, that means bits of data can be more than just 1 or 0, as they are in a conventional computer; they can also be something like both at the same time.

When data is encoded into effects like those, some normal limitations on conventional computers fall away. That allows a quantum computer to be much faster on certain tricky problems. Want a full PhD, or third-grade, explanation? Watch the video above.

More here:
Its Time You Learned About Quantum Computing | WIRED

Read More..

How to Encrypt Files on Windows – Tutorial – Toms Guide

If you’re looking for a simple way to keep files and folders private on your Windows computer, you have several options right in front of you. Thanks to the Microsoft Office Suite, you can use a built-in encryption feature to password-protect Office files, such as Word documents or PowerPoint presentations.

Some Windows operating systems also come with Encrypting File System (EFS), which lets you encrypt any kind of file, as well as whole folders and subfolders. Note, however, that EFS is only available for Windows 10 Pro, Windows 7 Professional, Windows 7 Ultimate, Windows 7 Enterprise, Windows 8 Pro or Windows 8 Enterprise. Users with a Home edition of Windows will need to use either Office Suite encryption or a third-party solution, such as TrueCrypt, VeraCrypt or 7-Zip.

Illustration: Toms GuideTo set up your Windows encryption, you’ll want to follow these step-by-step instructions.

MORE: Best Password Managers

Before you start altering your files, there are some tips you need to keep in mind.

This process encrypts individual files compatible with Microsoft Office applications such as Word, PowerPoint or Excel. Once you encrypt a file this way, you’ll need to reopen it in Microsoft Office; you won’t be able to open it in Google Docs, Adobe Reader or LibreOffice. These steps work for all up-to-date versions of Office, across Windows 7 and Windows 10.

1. Open a Microsoft Office program and click Open Other Documents.

2. Click Browse.

3. Select a file you want to encrypt and click Open.

4. Click the File tab at the top of the page.

5. Click “Protect Document” on the left side.

3. Select Encrypt with Password from the pop-up menu.

4. Enter a password for the file. You’ll be prompted to re-enter the same password, then click OK. After you exit this file, you’ll have to enter the same password to reopen it. Be sure to store this password in a separate, safe place.

You’re not quite done yet, though. One of the flaws with Microsoft Office’s encryption is that unencrypted versions of recently opened files might still be stored in your computer’s temporary memory. You’ll want to go clear that out after you’ve encrypted a file.

1. Click the Start button.

2. Type “Disk Cleanup” into the text field and select Disk Cleanup.

3. Wait for the loading bar to complete, it’s calculating how many files it will be able to delete.

4. After the window “Disk Cleanup for OS (C:) appears, check the box next to “Temporary files” (you may need to scroll down) and click OK.

5. A new pop-up window will appear asking you to confirm the deletion. Click Delete Files.

6. Youll see a new pop-up window (pictured below) with a loading bar running as your files are deleted. Once it’s finished, the window will disappear and the temporary files are gone.

EFS works by letting you apply encryption to already-existing files or folders in your file system. You can still edit or modify these files or folders following the encryption process. With EFS you won’t notice any change in the way you access your files; all you have to do is log in to your Windows account at startup and the files will be accessible. However, this means that you need to pick a strong, difficult-to-guess password for your Windows user account. Note: Step 7 is time-sensitive, so make sure to click the “Back up your file encryption key” prompt after confirming attribute changes in step 6. Missing that prompt means you’ll need to start over again.

1. Right-click on the file or folder you wish to encrypt.

2. Click Properties selection at the bottom of the menu.

3. Click Advanced under the General tab. This will bring up a second pop-up window entitled Advanced Attributes.

4. Check “Encrypt contents to secure data.”

5. Click OK.

6. Click Apply.

7. Choose how extensive you want the encryption to be, click OK. You can choose to encrypt just that folder, or to encrypt all of the folder’s subfolders and files. We recommend the latter. Whichever you choose, click that option and then press OK.

8. Make sure to click the “Back up your file encryption key” pop-up message before it disappears. If you miss the pop-up message, you’ll need to restart your machine and try again.

The computer creates an encryption key using an encryption certificate provided by Microsoft. Now your file or folder is encrypted, you won’t need a password to access it other than the password you use to sign into your Windows profile when you turn the computer on.

You should back up that encryption key to a separate device, because if that key is ever lost or damaged, you won’t be able to access your encrypted files. The easiest method is with an external USB drive, so plug one into your PC before starting.

1. Click the option “Back up now (recommended).”

2. Click Next.

3. Click Next again.

4. Check the box next to Password, enter your password twice and click Next.

5. Click Browse.

6. Navigate to a directory, such as a USB drive, name your encryption key and click save.

7. Click Next.

8. Click Finish.

9. Click OK, now eject your USB drive (or wherever you stored the file) and keep it somewhere safe where you’ll remember it.

Windows’ built-in encryption isn’t a perfect solution. If you encrypt a single file, the computer stores an unencrypted version of that file in its temporary memory, so a savvy snoop can still access it.

It’s fairly easy for an attacker to break Windows encryption using a brute-force attack, which is when an attacker uses a program that methodically guesses every possible combination of letters and numbers, starting with common passwords.

MORE: Your Router’s Security Stinks: Here’s How to Fix It

If you’re very serious about security and privacy, you might not trust a Microsoft solution. The FBI and NSA can require U.S. companies to hand over data or encryption keys. For those reasons, we suggest using a free third-party service, such as TrueCrypt, its successor VeraCrypt or WinZip.

More here:
How to Encrypt Files on Windows – Tutorial – Toms Guide

Read More..

Encryption, Key Management – bank information security

Please fill out the following fields:

CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean Trty.Brunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCook IslandsCosta RicaCote D’IvoireCroatiaCubaCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEast TimorEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrance, MetropolitanFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuineaGuinea-BissauGuyanaHaitiHondurasHong KongHungaryIcelandIndonesiaIran (Islamic Republic of)IraqIrelandIsraelItalyJamaicaJapanJordanKazakhstanKenyaKiribatiKoreaKorea (Democratic)KuwaitKyrgystanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacauMacedoniaMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesiaMoldovaMonacoMongoliaMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNetherlands AntillesNeutral ZoneNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorthern Mariana IslandsNorwayOmanPakistanPalauPanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalPuerto RicoQatarReunionRomaniaRussian FederationRwandaSaint HelenaSaint Kitts and NevisSaint LuciaSaint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwanTajikistanTanzaniaThailandTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUruguayUS Minor Outlying IslandsUzbekistanVanuatuVatican City StateVenezuelaViet NamVirgin Islands (British)Virgin Islands (US)Wallis and FutunaWestern SaharaYemenYugoslaviaZaireZambiaZimbabwe

Title Level Attorney / General Counsel / Counsel AVP Board of Director C Level – Other CCO CEO / President CFO Chairperson CIO CISO / CSO COO CRO CTO Director EVP / SVP / FVP Head Healthcare Professional Manager / Supervisor Partner VP –Other Title Level–

Job Function Anti-Money Laundering (AML) Audit Business Continuity/Disaster Recovery Business Development Cashier / Customer Service / Administrative Clinical Healthcare Professional Compliance / BSA Data Management Debit/Credit Card/Electronic Banking eCommerce / eBusiness Executive Management Finance / Accounting Founder / Owner Fraud HR / Training Information Security Information Technology Legal Lending Loss Prevention Marketing Network / Systems / Web Operations Others Policies / Procedures Product Management Project Regulatory Affairs Risk Management Sales Security / Privacy Vendor Management –Other Job Function–

Subscription Preferences:

Banking

Risk Management

Data Breach

Careers

Subscribe

Read more:
Encryption, Key Management – bank information security

Read More..

What is cloud computing? – Definition from WhatIs.com

Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that’s often used to represent the Internet in flowcharts and diagrams.

A cloud service has three distinct characteristics that differentiate it from traditional web hosting. It is sold on demand, typically by the minute or the hour; it is elastic — a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access). Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet, have accelerated interest in cloud computing.

A cloud can be private or public. A public cloud sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.) A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services.

Private cloud services are delivered from a business’s data center to internal users. This model offers the versatility and convenience of the cloud, while preserving the management, control and security common to local data centers. Internal users may or may not be billed for services throughIT chargeback. Common private cloud technologies and vendors include VMware and OpenStack.

In the public cloud model, a third-party cloud service provider delivers the cloud service over the internet. Public cloud services are sold on demand, typically by the minute or hour, though long-term commitments are available for many services. Customers only pay for theCPUcycles,storageorbandwidththey consume. Leading public cloud service providers include Amazon Web Services (AWS), MicrosoftAzure,IBMandGoogle Cloud Platform.

A hybrid cloud is a combination of public cloud services and an on-premises private cloud, with orchestration and automation between the two. Companies can run mission-critical workloads or sensitive applications on the private cloud and use the public cloud to handle workload bursts or spikes in demand.The goal of a hybrid cloud is to create a unified, automated, scalable environment that takes advantage of all that a public cloud infrastructure can provide, while still maintaining control over mission-critical data.

In addition, organizations are increasingly embracing a multicloud model, or the use of multiple infrastructure-as-a-service providers. This enables applications to migrate between different cloud providers or to even operate concurrently across two or more cloud providers. Organizations adopt multicloud for various reasons. For example, they could do so to minimize the risk of a cloud service outage or to take advantage of more competitive pricing from a particular provider. Multicloud implementation and application development can be a challenge because of the differences between cloud providers’ services and application program interfaces (APIs). Multicloud deployments should become easier, however, as providers’ services and APIs converge and become more homogeneous through industry initiatives such as the Open Cloud Computing Interface.

Cloud computing boasts several attractive benefits for businesses and end users. Five of the main benefits of cloud computing are:

Although cloud computing has changed over time, it has been divided into three broad service categories: infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS).

IaaS providers, such as AWS, supply avirtual serverinstance and storage, as well as APIs that enable users to migrateworkloadsto aVM. Users have an allocated storage capacity and can start, stop, access and configure the VM and storage as desired. IaaS providers offer small, medium, large, extra-large and memory- or compute-optimized instances, in addition to customized instances, for various workload needs.

In the PaaS model, cloud providers host development tools on their infrastructures. Users access these tools over the internet using APIs, webportalsor gateway software. PaaS is used for general software development, and many PaaS providers host the software after it’s developed. Common PaaS providers include Salesforce’sForce.com,AWS Elastic BeanstalkandGoogle App Engine.

SaaS is a distribution model that delivers software applications over the internet; these applications are often calledweb services. Users can access SaaS applications and services from any location using a computer or mobile device that has internet access. One common example of a SaaS application is MicrosoftOffice 365for productivity and email services.

Cloud providers are competitive, and they constantly expand their services to differentiate themselves. This has led public IaaS providers to offer far more than common compute and storage instances.

For example, serverless, or event-driven computing is a cloud service that executes specific functions, such as image processing and database updates. Traditional cloud deployments require users to establish a compute instance and load code into that instance. Then, the user decides how long to run — and pay for — that instance.

With serverless computing, developers simply create code, and the cloud provider loads and executes that code in response to real-world events, so users don’t have to worry about the server or instance aspect of the cloud deployment. Users only pay for the number of transactions that the function executes. AWS Lambda, Google Cloud Functions and Azure Functions are examples of serverless computing services.

Public cloud computing also lends itself well to big data processing, which demands enormous compute resources for relatively short durations. Cloud providers have responded with big data services, including Google BigQuery for large-scale data warehousing and Microsoft Azure Data Lake Analytics for processing huge data sets.

Another crop of emerging cloud technologies and services relates to artificial intelligence (AI) and machine learning. These technologies build machine understanding, enable systems to mimic human understanding and respond to changes in data to benefit the business. Amazon Machine Learning, Amazon Lex, Amazon Polly, Google Cloud Machine Learning Engine and Google Cloud Speech API are examples of these services.

Security remains a primary concern for businesses contemplating cloud adoption — especially public cloud adoption. Public cloud service providers share their underlying hardware infrastructure between numerous customers, as public cloud is amulti-tenant environment. This environment demands copious isolation between logical compute resources. At the same time, access to public cloud storage and compute resources is guarded by account login credentials.

Many organizations bound by complexregulatoryobligations andgovernancestandards are still hesitant to place data or workloads in the public cloud for fear of outages, loss or theft. However, this resistance is fading, as logical isolation has proven reliable, and the addition of dataencryptionand various identity and access management tools has improved security within the public cloud.

Here is the original post:
What is cloud computing? – Definition from WhatIs.com

Read More..

7 Best Managed Cloud Hosting Providers of 2018 – WPMyWeb

0

When it comes to hosting something bigger, then we always prefer Cloud Hosting. Cloud Hosting isa new kind of Hosting solution for hosting bigger website or projects. Cloud Hostingfunctionalities are almost same as VPS Hosting butworks in a different way.

If youare a developer or have a blog website, then we highly recommend you to get a Managed WordPress Hosting instead of Cloud Hosting. But if you are running a big project or have multi websites that receive millions of traffic, then Cloud Hosting will be the perfect option. In this topic, we will cover 7Best Cloud Hosting Providers of 2018.

Before we dig into 7Best Cloud Hosting Providers, lets see the difference of a Cloud and VPS hosting.

These days there is a lot of talk about VPS and Cloud Hosting. Many web hosting companies prefer if youhave an organization or business. And there is no doubt that businesses can reap huge benefits from Managed Cloud Hosting. However, it is still confusing either to choose VPS or Cloud Hosting. So, before purchasing, you need to know the key difference between VPS and Cloud Hosting.

VPS also known as Virtual Private Server, is a server with its own copy of Operating System and distributed server resources. You can host your VPS in a virtual environment. For example, if you have a personal computer, that is an example of a VPS. Lets see the Pros and Cons of VPS hosting.

Advantages of VPS Hosting:

Disadvantages of VPS Hosting:

Check, 7 Best VPS Hosting Providers in 2017

In constant, Cloud Servers are connected together in a cluster and backed by SAN storages. Unlike VPS servers, Cloud servers are connected with multiple machines. You can get unlimited storage, bandwidth, and top-notch hardware. Generally, there are more benefits of using a Managed Cloud Hosting.

Advantages of Cloud Hosting:

Disadvantages of Cloud Hosting:

There are many Cloud Hosting Providers available, which provide different features, price, and support. So its hard to choose the Best Cloud Hosting Providers. So we made a list of 7 Best Cloud Hosting Providers, which are less expensive than other hosting companies and provides all features as well.

HostGatoris one of the Best Cloud Hosting Providers that supercharges your site easily. It provides four times extra resources than a shared hosting, so you wouldnt face any resource limit issues of having high traffic. You can monitor and allocate resources easily from your hosting dashboard.

After deploying your virtual server, if a hardware issue arises, your site is automatically switched to another server. This way your server stays 100% online. Besides, theiroptimal caching configuration makes your site faster. However, making the site faster isnt the end, you will also need to track your visitors, page download speed, uptime etc. And all you can do this from your dashboard.

You can get Cloud Hosting at an affordable price. Their basic plan starts from only $4.95/m, which offers 1CPU cores, 2GB memory, Unlimited Storage, Unlimited Data Transfer and you can host your one domain. Each plan includes local caching, powerful SSD drives, cPanel, Data Monitoring tools etc.

Features:

Price: $4.95/m (We are using HostGator Cloud Hosting)

Bluehost is WordPress recommended hosting which provides all kinds of hosting at an affordable price. On just 2015, Bluehost launched their Cloud Hosting. It offers same features and price as HostGator. If you are finding a cheap Cloud Hosting, then Bluehost is a good option and HostGator alternatives too.

They offer free site migration, so if you already own a website, you can easily migrate your existing site. Besides their fully-managed hosting allows you to add additional resources to your needs, fix automatic failover, monitor resources etc. They also providing integrated caching, so your site load so fast.

Their standard Cloud planstarts from $6.95/m, which includes 2 core CPU, 2 GB ram, 100 GB SSD storage, 1 free domain, unmetered bandwidth, 500 MB email storage.

Features:

Price: $6.95/m

DreamHost is WordPress recommended hosting and it is powering over 1.5 million websites since 1995. Their hosting platforms are specially optimized for WordPress and they also offer a different kind of hosting options. If you are a beginner then you can start with their shared hosting which offers a free domain name registration.

No matter if you are a blogger or a developer, their managed cloud hosting is a great option. Unlike other hosting providers, you can launch your cloud hosting within 30 seconds. They dont limit anything to your hosting and you can run anyapplication on their high-performance SSD cloud servers. If you are thinking to migrate your site or project to their server, they will take care of this. Their hassle-free cloud servers allow you to control everything on your need.

Another thing we like about DreamHost that their cloud hosting price is much cheaper than other hosting company. Their starter cloud hosting plan starts from only $4.50/month and their all accounts come with 100 GB block storage and free bandwidth.

Features:

Price: $4.50/m

A2Hosting is the fastest cloud hosting provider. However, their cloud hosting price is a bit expensive, but you will get the full benefit from it.

If you search for A2Hosting reviews on Google, you will see this hosting is the most rated preferred hosting than others. They provide almost every hosting features that a business site needs to be running without any hassle. If you are using a hosting and want to switch to a high-performance hosting environment, then A2Hosting is the perfect solution for you.

Their basic plan starts from $15/month which offers 10Gbps redundant network, ultra-fast hardware, high availability failure, Dedicated IPs, full root access and much more. Unlike other cloud hosting providers, you can configure your own customized cloud hosting which means you only pay what you use.

Features:

Liquidweb provides highly managed cloud hosting that is suitable for all kinds of websites and brands. High traffic sites frequently get traffic spikes which cause downtime, but Liquidweb can easily manage heavy traffic. Whether your site gets 10 hits or 10 million hits, theirweb server clusters continue to serve your traffic with no downtime.

Liquidweb also simplified their website management system with the simple dashboard. From the dashboard, you can create your website in just a few seconds. With theirCloud Hosting, you dont have to setup and configure a server, all are managed by them. If you have one or multi-website, no problem, they allowyou to host an unlimited number of websites without extra charge.

Their price starting from $59/m and offers 1 TB monthly bandwidth, 50 GB SSD Storage, simple dashboard and CloudFlare CDN.

Features:

Price: $59/m

Vultr is one of the best high-performance Cloud Hosting Providers and a great alternative of DigitalOcean. It can both manage light and heavy traffic. Their all servers are built with powerful infrastructure, SSD drives, lightning fast network and they have total 15 Data Centers over the world.

From their admin panel, you can deploy CentOS, Debian, Ubuntu, Windowsetc Operating System. You will be provided full Root access to control all stuff and a dedicated IP address included with all VMs. You can integrate with their API to deploy, destroy and control your instance.

They offer hourly and monthly billing system, so you can pay per hour or month. Their Cloud hosting planstarts from $2.50/mo which includes 1 core CPU, 512 MB memory, 500 GB bandwidth.

Features:

Price: $2.50/m

SiteGround offers fully managed Cloud Hosting. If you have small development project or want to host a high traffic site, then SiteGround as the best option. With their every plan, you will getWHM & cPanel, 1 Dedicated IP,IP Tables Firewall, Free SSL certificated, SSH Access etc.

Their starting plan starts from $80/m which offers 2 CPU cores, 4 GB memory, 40 GB SSD Space and 5 TB Data Transfer. They use lightweight Linux containers for their managed servers and you can add additional resources to your server any time to auto-scale upon traffic spikes without rebooting.From their cPanel, you can launch WordPress or any other popular CMS with just one click. They also offer daily backups, free CDN, SuperCacher, Staging etc.

From their cPanel, you can launch WordPress or any other popular CMS with just one click. They also offer daily backups, free CDN, SuperCacher, Staging etc.Being a VIP user, you will get blazing fast support by real experts andless than 10 min replies on tickets.

Features:

Price: $80/m

Get SiteGround Cloud Hosting

In this article, we have shown a compact list of 7 Best Managed Cloud Hosting Providers of 2018. I hope this helps you to find the best Cloud Hosting Provider. Do you have any suggestion, please let us know by leaving a comment. You can also find us onFacebook, Twitter, Google+.

Related Articles,

See more here:
7 Best Managed Cloud Hosting Providers of 2018 – WPMyWeb

Read More..

Cloud Hosting vs. Shared Hosting Comparison | HostGator

To have a site live on the Internet youre going to need web hosting. But, how do you choose the right kind of hosting for your business?And what is the difference between cloud hosting vs. shared hosting?

Web hosting can be complex and there are a lot of options. Its easy to get lost, so dont feel bad if youre confused at the starting point.

Below we dive into the differences between cloud hosting and shared hosting. These are two of the most common hosting choices. Remember, there is no right choice for everyone; the right type for you depends upon the needs of your website.

Lets jump in!

Shared web hosting is the cheapest, most popular and most widely available type of hosting solution. Youll usually see it advertised for $9.99 or less a month.

With shared hosting a single server is divided up between multiple users. Each user will get a shared amount of bandwidth. However, each user can also put an unlimited amount of sites on their account. So the server thats being split up between multiple accounts can sometimes end up hosting thousands of sites!

This means that your site could perform poorly if another site on the server is taking up too many resources. However, web hosts usually do their best to mitigate these effects.

Cloud hosting is better for larger sites, while shared hosting can be a great choice for those with a very tight budget or for people who are planning on keeping their sites very small.

Curious about cloud hosting? Cloud hosting, or cloud VPS hosting, allows you to use the resources of multiple servers, rather than having your site confined to a single server location. This makes cloud services highly sought after.

The main benefit of cloud hosting is that it allows for unlimited expansion and is a must-have for heavy traffic sites. Cloud hosting also allows for greater protection from an overwhelmed server. If one server is overwhelmed, youll simply be switched to another cloud server.

Cloud hosting is widely seen as a better option to shared hosting because of its ability to handle large amounts of traffic, its improved security protection, and its reliability.

However, these extras do come at a cost, and most cloud hosting options are more expensive than shared hosting plans. But if youre planning on growing your site and you need a site with a high performance rate, the advantages then cloud hosting will probably be the best option for your needs.

That being said, if youre just getting started and have a very small or nonexistent budget, a shared hosting plan may be a good option for you then you until you have the cash to upgrade.

What hosting plan do you have? Let us know in the comments below.

Related

More here:
Cloud Hosting vs. Shared Hosting Comparison | HostGator

Read More..

Microsofts quantum computing network takes a giant leap …

Microsoft is focusing on the development of quantum computers that take advantage of cryogenically cooled nanowires. (Microsoft Photo)

REDMOND, Wash. Quantum computing may still be in its infancy but the Microsoft Quantum Network is all grown up, fostered by in-house developers, research affiliates and future stars of the startup world.

The network made its official debut today here at Microsofts Redmond campus, during a Startup Summit that laid out the companys vision for quantum computing and introduced network partners to Microsofts tools of the quantum trade.

Quantum computing stands in contrast to the classical computer technologies that have held sway for more than a half-century. Classical computing is based on the ones and zeroes of bit-based processing, while quantum computing takes advantage of the weird effects of quantum physics. Quantum bits, or qubits, neednt represent a one or a zero, but can represent multiple states during computation.

The quantum approach should be able to solve computational problems that cant easily be solved using classical computers, such as modeling molecular interactions or optimizing large-scale systems. That could open the way to world-changing applications, said Todd Holmdahl, corporate vice president of Microsofts Azure Hardware Systems Group.

Were looking at problems like climate change, Holmdahl said. Were looking at solving big food production problems. We think we have opportunities to solve problems around materials science, personal health care, machine learning. All of these things are possible and obtainable with a quantum computer. We have been talking around here that were at the advent of the quantum economy.

Representatives from 16 startups were invited to this weeks Startup Summit, which features talks from Holmdahl and other leaders of Microsofts quantum team as well as demos and workshops focusing on Microsofts programming tools. (The closest startup to Seattle is 1QBit, based in Vancouver, B.C.)

Over the past year and a half, Microsoft has released a new quantum-friendly programming language called Q# (Q-sharp) as part of its Quantum Development Kit, and has worked with researchers at Pacific Northwest National Laboratory and academic institutions around the world to lay the technical groundwork for the field.

A big part of that groundwork is the development ofa universal quantum computer, based on a topological architecture that builds error-correcting mechanisms right into the cryogenically cooled, nanowire-based hardware. Cutting down on the error-producing noise in quantum systems will be key to producing a workable computer.

We believe that our qubit equals about 1,000 of our competitions qubits, Holmdahl said.

Theres lots of competition in the quantum computing field nowadays: IBM, Google and Intel are all working on similar technologies for a universal quantum computer, while Canadas D-Wave Systems is taking advantage of a more limited type of computing technology known as quantum annealing.

This week, D-Wave previewed its plans for a new type of computer topology that it said would reduce quantum noise and more than double the qubit count of its existing platform, from 2,000 linked qubits to 5,000.

But the power of quantum computing shouldnt be measured merely by counting qubits. The efficiency of computation and the ability to reduce errors can make a big difference, said Microsoft principal researcher Matthias Troyer.

For example, a standard approach to simulating the molecular mechanism behind nitrogen fixation for crops could require 30,000 years of processing time, he said. But if the task is structured to enable parallel processing and enhanced error correction, the required runtime can be shrunk to less than two days.

Quantum software engineering is really as important as the hardware engineering, Troyer said.

Julie Love, director of Microsoft Quantum Business Development, said that Microsoft will start out offering quantum computing through Miicrosofts Azure cloud-based services. Not all computational problems are amenable to the quantum approach: Its much more likely that an application will switch between classical and quantum processing and therefore, between classical tools such as the C# programming language and quantum tools such as Q#.

When you work in chemistry and materials, all of these problems, you hit this known to be unsolvable problem, Love said. Quantum provides the possibility of a breakthrough.

Love shies away from giving a firm timetable for the emergence of specific applications but last year, Holmdahl predicted that commercial quantum computers would exist five years from now. (Check back in 2023 to see how the prediction panned out.)

The first applications could well focus on simulating molecular chemistry, with the aim of prototyping better pharmaceuticals, more efficient fertilizers, better batteries, more environmentally friendly chemicals for the oil and gas industry, and a new class of high-temperature superconductors. It might even be possible to address the climate change challenge by custom-designing materials that pull excess carbon dioxide out of the air.

Love said quantum computers would also be well-suited for addressing optimization problems, like figuring out how to make traffic flow better through Seattles urban core; and for reducing the training time required for AI modeling.

That list is going to continue to evolve, she said.

Whenever the subject quantum computing comes up, cryptography has to be mentioned as well. Its theoretically possible for a quantum computer to break the codes that currently protect all sorts of secure transactions, ranging from email encryption to banking protocols.

Love said those code-breaking applications are farther out than other likely applications, due to the huge amount of computation resources that would be required even for a quantum computer. Nevertheless, its not too early to be concerned. We have a pretty significant research thrust in whats called post-quantum crypto, she said.

Next-generation data security is one of the hot topics addressed $1.2 billion National Quantum Initiative that was approved by Congress and the White House last December. Love said Microsofts post-quantum crypto protocols have already gone through an initial round of vetting by the National Institute of Standards and Technology.

Weve been working at this in a really open way, she said.

Like every technology, quantum computing is sure to have a dark side as well as a bright side. But its reassuring to know that developers are thinking ahead about both sides.

Read this article:
Microsofts quantum computing network takes a giant leap …

Read More..