Page 1,784«..1020..1,7831,7841,7851,786..1,7901,800..»

Meta, Twitter, Apple, Google urged to up encryption game in post-Roe America – The Register

Facebook, Twitter, Google, Apple, and others today faced renewed pressure to protect the privacy of messaging app users seeking healthcare treatment.

Now that America has entered its post-Roe era, in which more than a dozen states have banned abortion, digital rights advocacy group Fight for the Future has called on tech companies to implement strong on-by-default end-to-end encryption (E2EE) across their messaging services to secure users' communications, and prevent conversations from being shared with police and others.

Crucially, campaigners want to ensure that people's chats discussing procedures outlawed at the state level can't be obtained by the cops and used to build a criminal case against them.

"When our messages are protected from interlopers, we can communicate freely, without the fear of being watched," said Caitlin Seeley George, Fight for the Future's campaigns and managing director, in a statement.

Tech companies are throwing their users to the wolves by allowing company employees, cops, and other third parties to access unprotected messages

"After the reversal of Roe v. Wade and with more rights cutbacks on the way, tech companies are throwing their users to the wolves by allowing company employees, cops, and other third parties to access unprotected messages."

In theory, E2EE should prevent anyone other than the two (or more) people involved in the private conversation from accessing its contents. This means that, for example, if the Facebook chats between a Nebraska teen daughter and her mom about an abortion had instead happened on a service like Signal or Meta's WhatsApp, both of which use E2EE by default, then Meta, even when served with a subpoena to turn over the private conversations, would not have been able to access their contents.

Meta, for its part, has committed to enabling default E2EE on both Messenger and Instagram "sometime in 2023," according to Meta spokesperson Alex Dziedzan.

Right now, customers have the option to enable the optional feature on both services, he added.

"The challenge for us is twofold," Dziedzan told The Register. "It's a technical one as well as a human-rights one."

Meta delivers 160 billion messages everyday across its Messenger, Instagram, and WhatsApp services, he said."Considering the size and scale, we can't afford to create a situation where messages get lost or the system falls down," Dziedzan said.

The second element, he added, addresses human rights. "How do we build end-to-end encryption in a thoughtful, critical manner? Are we building tools with enough safety for people, so they have the ability to block people? It's a massive engineering task it's not just flipping a switch," Dziedzan said.

Massive engineering task is right: Facebook staff aren't even sure where exactly people's data is stored, due to the sprawling distributed nature of the social network, which is used by billions of people every month.

Aside from Meta, none of the other messaging services responded to The Register's inquiries about their plans for E2EE.

This includes Twitter, which hasn't announced plans to implement encryption. This year it emerged that Twitter had suffered a security snafu that exposed Twitter account IDs linked to phone numbers and email addresses of a reported 5.4 million users. And, more recently, its former security boss alleged that about half of Twitter's roughly 10,000 staff have access to live production systems and user data, and that some staff quietly installed spyware on their computers on behalf of foreign intelligence.

Apple also did not respond to The Register's questions. While iMessage texts are end-to-end encrypted by default when sent between iPhones, messages between iPhone and Android devices don't use E2EE.

Google has called on Apple to "fix texting" by adopting Rich Communications Services (RCS), a protocol used by most mobile industry vendors but not the iPhone maker. So far that campaign hasn't worked.

RCS originally did not include E2EE, but Google Messages added support in late 2020; Group messages got E2E encryption this year. Google Chat, however, is not end-to-end encrypted.

Discord, which also does not use E2EE for messaging, did not respond to The Register's unencrypted requests for comments, either.

A Slack spokesperson, in an email to The Register, noted that while not E2EE, it does encrypt data at rest and data in transit.

"We also offer EKM (Enterprise Key Management), a security add-on for Slack Enterprise Grid that allows organizations to manage their own encryption keys using Amazon Key Management Service (KMS)," the spokesperson wrote.

"Slack will not share customer data with government entities or third parties unless we're legally obligated to do so and we make it our practice to challenge any unclear, overbroad, or inappropriate requests."

Go here to read the rest:
Meta, Twitter, Apple, Google urged to up encryption game in post-Roe America - The Register

Read More..

Patent Issued for Homomorphic encryption in a healthcare network environment, system and methods (USPTO 11431687): Nanthealth Inc. – Insurance News…

2022 SEP 21 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent by the inventors Kupwade-Patil, Harsh (Plano, TX, US), Seshadri, Ravi (Plano, TX, US), Soon-Shiong, Patrick (Culver City, CA, US), Witchey, Nicholas J. (Laguna Hills, CA, US), filed on May 27, 2021, was published online on August 30, 2022, according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 11431687 is assigned to Nanthealth Inc. (Culver City, California, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: The background description includes information that may be useful in understanding the present disclosure. It is not an admission that any of the information provided herein is prior art or relevant to the disclosure, or that any publication specifically or implicitly referenced is prior art.

The healthcare industry is going through a digital revolution stimulated in part by the American Recovery and Reinvestment Act of 2009. Modernizing healthcare has led to a new age of digital health and wellness, in which healthcare data is collected from disparate sources (e.g., sensors connected to patients), and stored in disparate healthcare clouds (e.g., private, community and public clouds). Moreover, the volume of agglomerated healthcare data is large enough to qualify as big data. As healthcare clouds become a prominent feature in the healthcare industry, there is a greater need for securely sharing patient information across such disparate healthcare clouds. Furthermore, with Accountable Care Organizations (ACOS) (e.g., healthcare care providers such as doctors, hospitals and insurance providers) coming together to provide high-quality care in a cost-effective manner, demand for seamless connectivity across the healthcare clouds is greater than ever. A simplified patient-centric model is desirable where patients can change providers and still share their information in a timely manner, for better diagnosis and treatment, and eventually for improved global health.

At present, healthcare providers who host sensitive patient data in private healthcare clouds across the globe are hesitant to share that information because of security and privacy issues. As healthcare providers move to community and public cloud based services, a need for secure interaction between disparate healthcare clouds increases. Furthermore, security regulations imposed by Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH) place an onerous task on healthcare Information Technology (IT) infrastructure to be compliant with privacy and security regulations. In addition, with emerging Internet of Things (IoT) market and its integration in the big data cloud platform, there is increased concern about security and privacy with the healthcare cloud paradigm.

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors summary information for this patent: Apparatus, systems and methods for homomorphic encryption in a healthcare network environment is provided and includes receiving data at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.

Various objects, features, aspects and advantages of the subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.

The claims supplied by the inventors are:

1. A system for developing predictive algorithms using private healthcare data, the system comprising: a data custodian including an encrypted database distributed among a plurality of storage devices, the encrypted database storing a disease registry including homomorphically encrypted concomitancy and comorbidity data of a plurality of patients; and a user device operable to access the data custodian over a cloud network, retrieve a subset of the homomorphically encrypted concomitancy and comorbidity data, and execute a predictive analytics model on the retrieved data, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian instantiates a homomorphic work space (HWS) that has access to the homomorphically encrypted concomitancy and comorbidity data stored in the encrypted database, wherein the data custodian provides the user device with access to the HWS via an API, wherein the API translates a query from the user device, the subset of the homomorphically encrypted concomitancy and comorbidity data being pulled from the encrypted database and inserted into the HWS in response to the translated query, wherein the query comprises an unstructured keyword query.

2. The system of claim 1, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian provides a public cryptographic key to the user device, the public cryptographic key having a corresponding private cryptographic key to the HWS.

3. The system of claim 1, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian generates a structured encrypted vector from the subset of the homomorphically encrypted concomitancy and comorbidity data and sends the structured encrypted vector and the API to the user device.

4. The system of claim 1, wherein the HWS is instantiated only at the data custodian.

5. The system of claim 1, wherein the HWS comprises a virtual memory space distributed across one or more memory locations.

6. The system of claim 1, wherein the HWS is built on top of homomorphic encryption primitives from a homomorphic encryption library.

7. The system of claim 1, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian constructs a symmetric cryptographic session.

8. The system of claim 1, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian creates a query-specific vector space with a vector containing the subset of the homomorphically encrypted concomitancy and comorbidity data.

9. The system of claim 1, wherein the data custodian authenticates one or more anonymized operations performed on the homomorphically encrypted concomitancy and comorbidity data by the user device.

10. The system of claim 1, further comprising a patient device operable to define a set of permissions authorizing the retrieval of the subset of the homomorphically encrypted concomitancy and comorbidity data by the user device.

11. The system of claim 1, wherein the data custodian decrypts a result of the predictive analytics model and sends the decrypted result to the user device.

12. The system of claim 1, wherein the API includes homomorphic encryption primitives from a homomorphic encryption library.

13. A method of supporting the development of predictive algorithms using private healthcare data, the method comprising: storing a disease registry including homomorphically encrypted concomitancy and comorbidity data of a plurality of patients in an encrypted database of a data custodian, the encrypted database being distributed among a plurality of storage devices; and, in response to a user device accessing the data custodian over a cloud network, providing a subset of the homomorphically encrypted concomitancy and comorbidity data to the user device for execution of a predictive analytics model on the provided data and instantiating a homomorphic work space (HWS) that has access to the homomorphically encrypted concomitancy and comorbidity data stored in the encrypted database, wherein the data custodian provides the user device with access to the HWS via an API, wherein the API translates a query from the user device, the subset of the homomorphically encrypted concomitancy and comorbidity data being pulled from the encrypted database and inserted into the HWS in response to the translated query, wherein the query comprises an unstructured keyword query.

14. A non-transitory computer readable storage medium on which are stored instructions executable by a processor to perform operations for supporting the development of predictive algorithms using private healthcare data, the operations comprising: storing a disease registry including homomorphically encrypted concomitancy and comorbidity data of a plurality of patients in an encrypted database of a data custodian, the encrypted database being distributed among a plurality of storage devices; and, in response to a user device accessing the data custodian over a cloud network, providing a subset of the homomorphically encrypted concomitancy and comorbidity data to the user device for execution of a predictive analytics model on the provided data and instantiating a homomorphic work space (HWS) that has access to the homomorphically encrypted concomitancy and comorbidity data stored in the encrypted database, wherein the data custodian provides the user device with access to the HWS via an API, wherein the API translates a query from the user device, the subset of the homomorphically encrypted concomitancy and comorbidity data being pulled from the encrypted database and inserted into the HWS in response to the translated query, wherein the query comprises an unstructured keyword query.

15. A system for developing predictive algorithms using private healthcare data, the system comprising: a data custodian including an encrypted database distributed among a plurality of storage devices, the encrypted database storing a disease registry including homomorphically encrypted concomitancy and comorbidity data of a plurality of patients; and a user device operable to access the data custodian over a cloud network, retrieve a subset of the homomorphically encrypted concomitancy and comorbidity data, and execute a predictive analytics model on the retrieved data, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian instantiates a homomorphic work space (HWS) that has access to the homomorphically encrypted concomitancy and comorbidity data stored in the encrypted database, wherein the data custodian provides the user device with access to the HWS via an API, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian generates a structured encrypted vector from the subset of the homomorphically encrypted concomitancy and comorbidity data and sends the structured encrypted vector and the API to the user device.

16. The system of claim 15, wherein the API translates a query from the user device, the subset of the homomorphically encrypted concomitancy and comorbidity data being pulled from the encrypted database and inserted into the HWS in response to the translated query.

17. The system of claim 15, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian provides a public cryptographic key to the user device, the public cryptographic key having a corresponding private cryptographic key to the HWS.

18. The system of claim 15, wherein the HWS is instantiated only at the data custodian.

19. The system of claim 15, wherein the HWS comprises a virtual memory space distributed across one or more memory locations.

20. The system of claim 15, wherein the HWS is built on top of homomorphic encryption primitives from a homomorphic encryption library.

21. The system of claim 15, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian constructs a symmetric cryptographic session.

22. The system of claim 15, wherein, in response to the user device accessing the data custodian over the cloud network, the data custodian creates a query-specific vector space with a vector containing the subset of the homomorphically encrypted concomitancy and comorbidity data.

23. The system of claim 15, wherein the data custodian authenticates one or more anonymized operations performed on the homomorphically encrypted concomitancy and comorbidity data by the user device.

24. The system of claim 15, further comprising a patient device operable to define a set of permissions authorizing the retrieval of the subset of the homomorphically encrypted concomitancy and comorbidity data by the user device.

25. The system of claim 15, wherein the data custodian decrypts a result of the predictive analytics model and sends the decrypted result to the user device.

26. The system of claim 15, wherein the API includes homomorphic encryption primitives from a homomorphic encryption library.

There are additional claims. Please visit full patent to read further.

URL and more information on this patent, see: Kupwade-Patil, Harsh. Homomorphic encryption in a healthcare network environment, system and methods. U.S. Patent Number 11431687, filed May 27, 2021, and published online on August 30, 2022. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=11431687.PN.&OS=PN/11431687RS=PN/11431687

(Our reports deliver fact-based news of research and discoveries from around the world.)

More here:
Patent Issued for Homomorphic encryption in a healthcare network environment, system and methods (USPTO 11431687): Nanthealth Inc. - Insurance News...

Read More..

It Can Take Three Appeals to Make a Claim Construction Go Rightor Three Bites by Apple – Lexology

In a nonprecedential opinion on remand from the US Court of Appeals for the Federal Circuit and a US Patent & Trademark Office (PTO) Director-granted request for review, the Patent Trial & Appeal Board (Board) reconstrued claim terms it had previously construed in consideration of the patent specification, prosecution history and Federal Circuit construction of similar terms in a related case. Apple Inc. v. Personalized Media Communications, LLC, IPR2016-00754, IPR2016-01520 (P.T.A.B. Sept. 8, 2022) (Turner, APJ.)

In March 2016, Apple filed a petition to institute an inter partes review (IPR) against a patent (635 patent) owned by Personalized Media Communications, LLC (PMC). After PMC filed its Patent Owner Preliminary Response (POPR), the Board instituted the IPR on some, but not all, of Apples requested grounds. Per Board procedure, PMC filed its Patent Owner Response (POR) and a contingent motion to amend its patents claims. In response, Apple filed a reply and an opposition to the contingent motion, and PMC filed a reply to Apples opposition. After oral argument the Board issued a Final Written Decision (754-FWD) finding all challenged claims unpatentable and denying the contingent motion to amend. PMC first sought rehearing of the Boards decision and, after rehearing was denied, appealed the Boards decision to the Federal Circuit.

Similarly, in July 2016, Apple filed another petition against the same PMC patent. After considering PMCs POPR, the Board instituted an IPR on some of Apples requested grounds. PMC again filed a POR and a contingent motion to amend, to which Apple filed a reply and opposition (to which PMC filed its reply and Apple a sur-reply). Again, the Board held an oral hearing and issued a Final Written Decision (FWD) finding all challenged claims unpatentable and denying the contingent motion to amend. PMC again sought rehearing of the Boards decision and, after rehearing was denied, appealed the Boards decision to the Federal Circuit.

On appeal of each proceeding, PMC moved, and the Federal Circuit granted remand in light of and consistent with the 2021 Supreme Court decision in U.S. v. Arthrex, Inc., where a five-justice majority found that the appointment of Board administrative patent judges was unconstitutional and a seven-justice majority concluded that the remedy was to vest the PTO Director with authority to overrule Board decisions.

On remand to the PTO, PMC filed a request for director review, which the Commissioner for Patents (performing the functions and duties of the PTO Director) granted. The Commissioners Granting Order agreed with PMCs argument that the Board, in these two cases, had construed the claim terms encrypted and decrypted in a manner that could include scrambling and descrambling operations on digital information, but could also include on analog information and was inconsistent with the Federal Circuits partial reversal of the Boards construction in yet another IPR proceeding (755-IPR regarding another related PMC patent) between Apple and PMC. As to the related patent IPR, the Federal Circuit ultimately construed encrypted digital information transmission including encrypted information as limited to digital information. The Commissioner vacated both of the subject FWDs and remanded for the Board to address its claim constructions in light of the Federal Circuits decision in the related patent IPR.

After remand, the Board set a briefing schedule for the parties to argue the applicability of the grounds identified above in view of the claim construction set forth by the U.S. Court of Appeals for the Federal Circuit. Apple argued that the term that the Federal Circuit construed as to the related patent is different from the claim terms recited in the subject IPRs and the FWDs at issue. Apple also argued that the Federal Circuit explicitly did not limit the basic concepts of encryption and decryption to digital-only operations, and thus altering the construction to be digital-only would be flatly inconsistent with the Federal Circuits holding and reasoning. Apple further argued that certain claims (and the art cited against them) already recite all-digital requirements, that other claims do not recite the disputed term and should not be affected, and that all but one of the challenged claims are unpatentable even under PMCs alternative constructions. PMC argued that Apple had agreed then that even under the Federal Circuits construction [at least] claim 3 of the subject patent would survive, and more broadly argued that Apple misread the Federal Circuits decision and that the Court did not reject the Boards construction of decrypt or re-construe that term (emphasis in original).

The Board saw its task as quite clear: To issue new final written decisions that address the Federal Circuits claim construction in the appeal of the [related patent] IPR/FWD. The Board gave weight to the fact that the subject patent and the related patent are both continuation applications of the same patent, and thus share the same specification. Deeming that it would be myopic to construe only the identical claim term to those resolved by the Federal Circuits decision, the Board considered that even the Courts decision referenced that the claim language itself did not preclude PMCs interpretation nor compel the Boards interpretation and that, based on multiple characteristics, the two constructions were equally plausible in view of the claim language.

However, just as in the other case where the Federal Circuit considered the prosecution history of the related patent and determined that certain statements did not reach the level of disavowal to inform the claim construction (e.g., the applicant repeatedly and consistently voiced its position that encryption and decryption require a digital process in the context of the patent and never abandoned that position), and with deference to the Granting Orders note that [t]he Boards claim construction analysis for the terms encrypted and decrypted in the cases is substantially similar to the Boards related analysis of the term encrypted digital information transmission including encrypted information at issue in the Federal Circuit case, the Board on remand reconstrued the claim terms. With acknowledgment of both parties arguments and citations to the specification and prosecution history, the Board construed the claim terms decryption, encryption and related terms to be applicable to digital signals, exclusive of scrambling and descrambling, unless the context of the claim makes clear that the decryption and/or encryption process is performed on an analog or a mixed analog and digital signal.

Applying this construction, and after reviewing anew the record developed during trial and considering the Federal Circuits construction, the Board on remand found that Apple had sufficiently met its burden of persuasion such that considering all eight grounds, all but one (claim 3) of the challenged claims of the 635 patent are unpatentable. The Board denied PMCs contingent motions to amend in each case.

Continued here:
It Can Take Three Appeals to Make a Claim Construction Go Rightor Three Bites by Apple - Lexology

Read More..

Explained in 5 points: WhatsApp chats are end-to-end encrypted, what it means? – India Today

Of late, WhatsApp has been talking a lot about privacy. In fact, the messaging platform recently introduced a range of privacy features like hiding online status, leaving group chat without notifying anyone and a lot more. These features will reach every user very soon, the company has already confirmed. Another privacy feature that WhatsApp has been highlighting since the last several years is "end-to-end encryption".

If you use WhatsApp on a regular basis to connect with your friends and family, you must definitely have come across the term "end-to-end encryption". Now, the question is, what does WhatsApp mean by chats are end-to-end encrypted? and how does this impact users? Let's understand this in 5 simple points.

--The meta-owned messaging platform, WhatsApp, says that all chats exchanged on the platform are protected or "encrypted". In simple words, as per WhatsApp, chats sent or received on the platform are only visible to the sender or receiver of the message and no one else. Not even WhatsApp or its parent company Meta.

--As per WhatsApp, under the end-to-end encryption policy -- all messages, photos, videos, voice messages, documents, status updates and calls exchanged on the platform are secured and can't be accessed by bad actors. End-to-end encryption ensures chats are secured between the sender and receiver of the message and no one, including WhatsApp can access the conversation at any given point.

--WhatsApp says that an end-to-end encryption feature ensures all messages are secured with a lock, and only the recipient and the sender have the special key needed to unlock and read them. This simply means that all your chats with all your contacts are unreadible to everyone other than the sender and receiver of the messages.

--The good thing is, WhatsApp has auto-enabled the end-to-end encryption option for all accounts and no one will need to turn on any special settings to secure their messages. There's also no way to disable the option.

--Recently, there have been a lot many controversies around WhatsApp's end-to-end encryption feature and the Indian government's current IT rules that state, if required, social media platforms such as WhatsApp must have provisions for identification of the first originator of the information. Now, this goes against WhatsApps policies of end-to-end encrypting all messages happening on the platform. When the IT rules were introduced, Meta also challenged the government stating that the guidelines go against the platforms key policies. WhatsApp hasn't yet highlighted how it plans to manage situations when the government asks for details of users and access to personal chats in some instances.

So, if you use WhatsApp to connect with your family and friends, your chats are encrypted and no one can access them. If you fear that someone can login to your mobile phone and read your chats, WhatsApp has a solution for that as well. It allows users to password protect the app and all the chats and media files shared on the platform.

--- ENDS ---

Originally posted here:
Explained in 5 points: WhatsApp chats are end-to-end encrypted, what it means? - India Today

Read More..

keep all your files in a secure cloud with end-to-end encryption – Gearrice

One of the great concerns that any type of user may have when uploading their documents to the Internet is the security of the servers where they are stored. Currently there are many options such as Google Drive or iCloud Drive, but none guarantee maximum security. To do this, the company of the well-known email service that set out to put an end to Gmail, Proton Mail, has officially launched the Proton Drive service with cloud encryption.

As reported by Proton, digital documents contain a lot of confidential information, whether of banking or tax interest. That is why local storage can be used to avoid this risk, sacrificing the convenience of having the files on any device. In this way, the proposed solution is to use Proton Drive which will offer you the possibility to store them securely with end-to-end encryption.

In this case, Proton Drive has an end-to-end encryption system that provides total security. All these have a cryptographic signature on all files and folders to prevent them from being tampered with in an unauthorized manner. Also, the key to be able to decrypt these files is only going to be yours, since not even Proton is going to be able to decrypt them.

the headquarters of the servers are located in Geneva (Switzerland). Although it seems silly, it is really important as the documents are protected by Swiss privacy laws, which are really strict when it comes to dissemination. In this case, they try to resemble the data vault that a Swiss bank has and which is difficult to access, even if there is a court order.

You will be able to access all these features through different ways: application on Android and iOS, as well as in the web version. In this way, it makes it accessible for anyone to freely upload documents from any device and also access them. And all this with the maximum security possible.

Keep in mind that with Proton Drive you have a free base storage of 1 GB. These will allow you to upload mainly important PDF files that have a reduced size, but that may be insufficient. That is why you can use one of the other two plans that are available:

Source | Proton

Read the original here:
keep all your files in a secure cloud with end-to-end encryption - Gearrice

Read More..

Empress EMS Announces Data Breach Leaking the Sensitive Information of 318,558 People – JD Supra

On September 9, 2022, Empress EMS reported a data breach with the U.S. Department of Health and Human Services Office for Civil Rights after the company was the victim of what appears to have been a ransomware attack. According to Empress EMS, the breach resulted in the names, Social Security numbers, dates of service and insurance information of 318,558 patients being compromised. Recently, Empress EMS sent out data breach letters to all affected parties, informing them of the incident and what they can do to protect themselves from identity theft and other frauds.

News of the Empress EMS comes from the companys official filing with the U.S. Department of Health and Human Services Office for Civil Rights as well as a notice posted on the companys website. According to these sources, on July 14, 2022, Empress EMS detected a network security incident, apparently when some or all of the companys computer system was encrypted. In response, the company reported the incident to law enforcement, secured its systems, and began working with third-party data security experts to conduct an investigation.

The companys investigation confirmed that an unauthorized party first gained access to the Empress EMS system on May 26, 2022 and subsequently copied files from the network on July 13, 2022.

Upon discovering that sensitive consumer data was accessible to an unauthorized party, Empress EMS then reviewed the affected files to determine what information was compromised and which consumers were impacted. While the breached information varies depending on the individual, it may include your name, the date you received service from Empress EMS, your Social Security number, and your insurance information.

On September 9, 2022, Empress EMS sent out data breach letters to all individuals whose information was compromised as a result of the recent data security incident. According to the U.S. Department of Health and Human Services Office for Civil Rights, these letters were sent out to 318,558 people. Empress EMS is offering all people impacted by the breach with free credit monitoring and is recommending they review their healthcare statements for accuracy and contact their provider if they see services they did not receive.

Founded in 1985, Empress EMS is an ambulance services company based in Yonkers, New York. The company provides 911 emergency medical response transportation to Yonkers and neighboring communities. Additionally, Empress EMS has emergency and non-emergency response contracts throughout Westchester County with districts, hospitals, correctional institutions and private care facilities. Empress EMS employs more than 204 people and generates approximately $17 million in annual revenue.

The Empress EMS filing with the U.S. Department of Health and Human Services Office for Civil Rights did not get into too much detail about the nature of the breach. However, the company provided some additional information in a letter posted on the Empress EMS website. There, the company noted that the data breach was caused by a network incident resulting in the encryption of some of our systems.

Encryption is a process that encodes files, making them inaccessible to anyone without the encryption key (which is usually a password). People encrypt files every day to protect sensitive data from unauthorized access. However, cybercriminals also use encryption when carrying out certain types of cyberattacksusually ransomware attacks.

A ransomware attack is a type of cyberattack that occurs when a hacker or other bad actor installs malware on a companys computer network. Hackers frequently do this by sending a phishing email to an employee in hopes of getting them to click on a malicious link. Once the employee clicks on the link, it downloads the malware onto their computer. The malware then encrypts the files on the computer and may infect other parts of the network. The hackers then send management a message, demanding it pays a ransom if it wants access to its network. Once the company pays the ransom, the hackers decrypt their computer, which ends the attackat least from the companys perspective.

However, more recently hackers have started to threaten to publish any stolen data if a company refuses to pay the ransom. Once on the dark web, cybercriminals can bid on the data, which they can then use to commit identity theft and other frauds. Of course, while companies that are targeted in a ransomware attack are victims in some sense, the real victims of these attacks are the consumers whose information ends up in the hands of those looking to commit fraud.

So, while Empress EMS did not mention the words ransomware attack in its communications, because we know it involved the encryption of the companys system, there is a good chance that this was caused by a ransomware attack.

Companies not only have the resources to pay an occasional ransom, but they also have the ability (and responsibility) to implement strong data security systems designed to prevent these attacks in the first place. Victims of a data breach who would like to learn how to reduce the risk of identity theft or learn about their options to hold the company that leaked their information accountable should contact a data breach lawyer as soon as possible.

If you are one of the more than 318,000 people who were affected by the Empress EMS data breach, it is imperative that you understand what is at stake and how you can mitigate these risks. If you or a loved one received services from Empress EMS and have not yet received a letter, you can review a copy of the letter here.

Continued here:
Empress EMS Announces Data Breach Leaking the Sensitive Information of 318,558 People - JD Supra

Read More..

Robots, NatCons, and the Zombie Apocalypse – The Bulwark

Every week I highlight three newsletters that are worth your time.

If you find value in this project, do two things for me: (1) hit the Like button, and (2) share this with someone.

Most of what we do in Bulwark+ is only for our members, but this email will always be open to everyone.

Were running a Fall Special right now (not a thing we do very often) and well give you two weeks of Bulwark+ for free, so you can try it out. I think youll like it. But if not, no harm, no foul.

And you can always sign up just to get on the list for our free stuff, of which there is a lot.

Get The Special Deal

OR

Sign Up For The Free Stuff

I link to Joe a lot because hes tremendous and has a knack for hitting angles on stories most people never consider.

This edition of his newsletter got me thinking:

Because computers are so much better than people at chess now, theres a big, big problem with cheating. People playing online will often use a chess engine to defeat people and build up their ratings and, I guess, feel powerful. I dont actually get what the thrill is in cheating at chess, but its such an issue that Chess.com has instituted ultra-sophisticated methods of tracking down cheaters and then closing their accounts. . . .

Chess was once an artform, and the greatest players people with names like Tal and Fischer and Kasparov and Polgar could create beauty on the board. There were not exactly right and wrong moves; instead there were endless possibilities.

Now, yeah, there are right and wrong moves. The computers tell us so. Sure, the grandmasters still do create art, still bewilder and awe us mere mortals with their creativity and how many moves ahead they can see. But computers can see more moves ahead.

All of which leads to the controversy a match in St. Louis between Magnus Carlsen and a 19-year-old phenom named Hans Niemann. . . .

Niemann was born in San Francisco, and he left home at 16 to become a full-time chess streamer. He has sort of built a reputation as a chess outsider; a few weeks ago, he was the lowest-rated player at a tournament but on the second day he defeated Magnus Carlsen with the black pieces, a near impossibility.

Hans, the interviewer said as he walked out of the room, yesterday was a terrible day for you and today you start out with a masterpiece. How would you summarize this?

The chess speaks for itself, he said, and he walked off even as the interviewer tried to ask a follow-up question. (Is this something special to do this against Magnus, Hans? the interviewer asked Neimanns retreating back.) The interviewer then broke out laughing.

In the staid world of chess, this was basically like lighting a row of firecrackers in the middle of the Vatican.

After that Chess speaks for itself comment, Niemann did not win a single point in the tournament . . .

Read the whole thing and subscribe. You wont be sorry.

Was Neimann somehow cheating with the help of a computer? Thats not the point. What Posnanski is getting at is something weve talked about here before: How technology is running headlong into life sports and creating problems that go to the foundation of what it means to be human.

Posnanski then moves on to another data point: Devon Allens false start.

Devon Allen a wide receiver for the Philadelphia Eagles was disqualified from the 110-meter hurdles at the World Athletics Championships a few weeks ago for a false start.

Heres the problem: You cant see the false start. Nobody can see the false start. By sight, Allen most definitely does not leave before the gun. . . .

But heres the thing: World Athletics has determined that it is not possible for someone to push off the block within a tenth of a second of the gun without false starting. They have science that shows it is beyond human capabilities to react that fast. Of course there are those (Im among them) who would tell you thats nonsense, thats pseudoscience, theres no way that they can limit human capabilities like that. There is science that shows it is humanly impossible to hit a fastball. There was once science that showed human beings could not run a four-minute mile.

Besides, do you know what Devon Allens reaction time was? It was 0.99 seconds. One thousandth of a second too fast, according to World Athletics science. Theyre THAT sure that .01 seconds and EXACTLY .01 seconds is the limit of human possibilities that they will disqualify an athlete who has trained his whole life for this moment because he reacted one thousandth of a second faster than they think possible?

Were moving in this direction with many sports. Tennis with the new robot linesmen. (Linesbots?) Baseball with super-slow motion, 4k replays and cameras that definitively determine balls and strikes.

These are the baby steps into a new kind of human experience. And Im not sure I like it.

Share

It is difficult to write about friends you believe are headed to dark places. Damon Linker does so quite movingly about his old friend, Rod Dreher:

The tweet is telling us, as Rod does so often these days, that things are about to get very, very bad, and far worse than anyone (except Rod and his closest ideological confidantes) realizes. Specifically, the entire world is about to experience hyperinflation as a result of the severe energy crunch in Europe tied to sanctions against Russia for its invasion of Ukraine and Vladimir Putins efforts at retaliation against the European Union.

That does sound bad. But then why the chipper headlineCheer Up! The World Is Endingfor the post Rod is promoting with his tweet? Perhaps because the tweet and the post arent really about the literal end of the world. Theyre about what is supposedly a looming disaster for modern civilizationan economic catastrophe that would make the financial crisis of 2008 look like a minor tremor, followed by falling governments and other forms of severe civic turbulence. Thats what Rod foresees on the horizon and what has put him in a giddy mood.

Clicking on the link confirms this reading. The post begins by telling us that he just finished a great breakfast in Miami, that he has good news to share, but that first he will start with some bad news.

The bad news is that we are all in for very hard times, and soon. I have spoken to several people in a position to know these things, and the consensus is that global hyperinflation is on its way. The energy crisis in Europe is much worse than our media have been telling us.

People are saying, at the right-wing conference, that the world is about to experience hyperinflation. Who are these people in a position to know? Are they economists? Are they sane economists? Economists with a track record of making accurate predictions? Are they government officials? From which countries and parties? Are they privy to information not publicly known or available? I dont know the answers to any of these questions because Rod tells us nothing about who is saying these things.

Instead, he links for support to a right-wing website, which points to a tweet thread by a Finnish economist who writes a column for The Epoch Times, a far-right international newspaper affiliated with the Falun Gong. This economists most recent column is titled Europe is Bound to Collapse. Two columns before that, he wrote Chinas Economy is Destined to Collapse. Two before that, it was Are We Headed for Another Great Crash (of 1929)? Im sensing a pattern.

(Shoot me if I ever start talking about people in a position to know as my appeal to authority.)

Anyway, Linker continues:

[Dreher] is ready and eager to defer to the supposed expertise of others, to place his trust in what they tell him, provided they attend the same right-wing conferences, write for trusted right-wing media outlets, and/or validate his deeply felt convictions. Thats not just confirmation bias. Its the active, headlong pursuit of confirmation at the cost of fatally sacrificing his own critical intellect. But he doesnt just defer to those who tell him what he wants to hear. He amplifies what theyre saying, adding assurances at regular intervals (and sometimes in italics or bold type) that this thing I am saying is true.

Rod has come to write like a prophet bringing the good news of impending apocalypse. Again, this isnt literal armageddon. Its merely armageddon for the modern liberal order, which, he insists, will very soon be obliterated in a tsunami of economic immiseration. Rods advice, following the tweet thread from the Chicken Little economist from Finland, is to stock cash, food, water, and (for those fortunate enough to possess the right kind of stove) wood.

Read the whole thing and subscribe. Damon is great.

Im a bit of a catastrophist myself, and guys like Rod are giving us a bad name.

There are times when its perfectly reasonable to go full prepper. Hurricane season, for example. Or the start of a global pandemic.

But heres the thing: We prep for transitory catastrophes. Crises that have endpoints.

Because there is no way to prep for the end of civilization. If the r/collapse stuff hits and governments start falling, having some canned beans, water, and a fistful of dollars buys you, what, a month? And after that, the fires of anarchy will sweep you up, too.

I dont want to make fun of Rod Dreher, but if the modern liberal order fails, hes not gonna make it. Because its not guys like this who survive the apocalypse:

Its guys like this:

Share

Damian keeps an eye on Canada for me. And he keeps his other eye on Europe, where he notes that the Overton window on right-wing nationalism keeps shifting. He points to the big gains and mainstream acceptance of Swedens right-wing party last week. And:

Meanwhile, in Italy, a bloc led by the post-fascist Brothers of Italy looks poised to take power . . .

Some argue that [Giorgia] Meloni (who is laser-focused on the major issues affecting Italians, like Peppa Pig episodes with same-sex parents, just in case you thought meltdowns over woke pop-culture was strictly an American thing) may become Prime Minister in no small part because fascism was never as socially unacceptable in postwar Italy as Nazism was in postwar Germany . . .

In France, obviously, we have Marine Le Pen losing, but getting too close for comfort. And then:

Germany has its own established far-right party, the Alternative fr Deutschland, but so far the cordon sanitaire around AfD has held up. Its never been part of a governing coalition at the federal nor the state level, and its support appears to have receded since the Syrian refugee crisis was at its peak. . . .

It hasnt disappeared completely, though, and it still mustered just over 10% support in the 2021 German federal election. At the state level, especially in the former East Germany, its finished second with over a quarter of the popular vote in some recent elections.

AfD hasnt died out like some predicted/hoped, and it seems to have a hard base of support that will win it seats in the Bundestag (Parliament) every time. In a country with proportional representation, where coalition governments are the norm, ten percent of the vote buys you a lot of bargaining power.

Germany is much more conscious of its dark past than other countries on the losing side in 1945, so AfD may never become as popular nor as accepted as its allies outside of Germany.

But they said the same thing about Sweden, not long ago. Just like they said Marine Le Pen and her Rassemblement National in France had peaked.

Im hoping this winter wont be as severe for a gas-starved Europe as some commentators say. But, if things only get one-quarter as bad as the most apocalyptic predictions, everything is on the table.

Read the whole thing and subscribe. Because that last bit should give you a chill. We have no idea what the political consequences of the Russian energy war will be on European politics.

But in general, the demagogues do well in times of economic crisis.

Share The Triad

If you find this newsletter valuable, please hit the like button and share it with a friend. And if you want to get the Newsletter of Newsletters every week, sign up below. Its free.

But if youd like to get everything from Bulwark+ and be part of the conversation, too, you can do the paid version.

Get 14 day free trial

Link:
Robots, NatCons, and the Zombie Apocalypse - The Bulwark

Read More..

Exploring Quantum Computing | Insights – Holland & Knight

  1. Exploring Quantum Computing | Insights  Holland & Knight
  2. Disentangling the Facts From the Hype of Quantum Computing  IEEE Spectrum
  3. Brown mathematicians' algorithm to serve as cryptography standard for quantum computing era  Brown University
  4. Quantum Computing: What Is It? How Is It Different From Classical Computing? How Does It Work?  ABP Live
  5. Bitcoin vs. Quantum Computers: US Government Says Post-Quantum World Is Getting Closer, CISA Warns Contemporary Encryption Could Break Technology Bitcoin News  Bitcoin News
  6. View Full Coverage on Google News

Follow this link:
Exploring Quantum Computing | Insights - Holland & Knight

Read More..

PsiQuantum Has A Goal For Its Million Qubit Photonic Quantum Computer To Outperform Every Supercomputer On The Planet – Forbes

PsiQuantum

In 2009, Jeremy O'Brien, a professor at the University of Bristol, published a research paper describing how to repurpose on-chip optical components originally developed by the telecom industry to manipulate single particles of light and perform quantum operations.

By 2016, based on the earlier photonic research, OBrien and three of his academic colleagues, Terry Rudolph, Mark Thompson, and Pete Shadbolt, created PsiQuantum.

The founders all believed that the traditional method of building a quantum computer of a useful size would take too long. At the companys inception, the PsiQuantum team established its goal to build a million qubit, fault-tolerant photonic quantum computer. They also believed the only way to create such a machine was to manufacture it in a semiconductor foundry.

Early alerts

PsiQuantum first popped up on my quantum radar about two years ago when it received $150 million in Series C funding which upped total investments in the company to $215 million.

That level of funding meant there was serious interest in the potential of whatever quantum device PsiQuantum was building. At that time, PsiQuantum was operating in a stealth mode, so there was little information available about its research.

Finally, after receiving another $450 million in Series D funding last year, PsiQuantum disclosed additional information about its technology. As recently as few weeks ago, a small $25 million US government grant was awarded jointly to PsiQuantum and its fabrication partner, GlobalFoundries, for tooling and further development of its photonic quantum computer. Having GlobalFoundries as a partner was a definite quality signal. GF is a high-quality, premiere fab and only one of the three tier one foundries worldwide.

With a current valuation of $3.15 Billion, PsiQuantum is following a quantum roadmap mainly paved with stepping stones of its own design with unique technology, components, and processes needed to build a million-qubit general-purpose silicon photonic quantum computer.

Technology

Classical computers encode information using digital bits to represent a zero or a one. Quantum computers use quantum bits (qubits), which can also represent a one or a zero, or be in a quantum superposition of some number between zero and one at the same time. There are a variety of qubit technologies. IBM, Google, and Rigetti use qubits made with small loops of wire that become superconductors when subjected to very cold temperatures. Quantinuum and IonQ use qubits formed by removing an outer valence electron from an atom of Ytterbium to create an ion. Atom Computing makes neutral atom spin qubits using an isotope of Strontium.

Light is used for various operations in superconductors and atomic quantum computers. PsiQuantum also uses light and turns infinitesimally small photons of light into qubits. Of the two types of photonic qubits - squeezed light and single photons - PsiQuantums technology of choice is single-photon qubits.

Using photons as qubits is a complex process. It is complicated to determine the quantum state of a single photon among trillions of photons with a range of varied frequencies and energies.

Dr. Pete Shadbolt is the Co-Founder and Chief Strategy Officer of PsiQuantum. His responsibilities include overseeing the application and implementation of technology and scientific-related policies and procedures that are vital to the success of PsiQuantum. After earning his PhD in experimental photonic quantum computing from the University of Bristol in 2014, he was a postdoc at Imperial College researching the theory of photonic quantum computing. While at Bristol, he demonstrated the first-ever Variational Quantum Eigensolver and the first-ever public API to a quantum processor. He has been awarded the 2014 EPSRC "Rising Star" by the British Research Council; the EPSRC Recognizing Inspirational Scientists and Engineers Award; and the European Physics Society Thesis Prize.

Dr. Shadbolt explained that detecting a single photon from a light beam is analogous to collecting a single specified drop of water from the Amazon river's volume at its widest point.

That process is occurring on a chip the size of a quarter, Dr. Shadbolt said. Extraordinary engineering and physics are happening inside PsiQuantum chips. We are constantly improving the chips fidelity and single photon source performance.

Just any photon isnt good enough. There are stringent requirements for photons used as qubits. Consistency and fidelity are critical to the performance of photonic quantum computers. Therefore, each photon source must have high purity, proper brightness, and generate consistently identical photons.

The right partner

GlobalFoundries facility in Essex, Vermont

When PsiQuantum announced its Series D funding a year ago, the company revealed it had formed a previously undisclosed partnership with GlobalFoundries. Out of public view, the partnership had been able to build a first-of-its-kind manufacturing process for photonic quantum chips. This manufacturing process produces 300-millimeter wafers containing thousands of single photon sources, and a corresponding number of single photon detectors. The wafer also contains interferometers, splitters, and phase shifters. In order to control the photonic chip, advanced electronic CMOS control chips with around 750 million transistors were also built at the GlobalFoundries facility in Dresden, Germany.

Photon advantages

Every quantum qubit technology has its own set of advantages and disadvantages. PsiQuantum chose to use photons to build its quantum computer for several reasons:

Another major advantage of photon qubits worth highlighting is the ability to maintain quantum states for a relatively long time. As an example of lights coherence, despite traveling for billions of years, light emitted by distant stars and galaxies reaches earth with its original polarization intact. The longer a qubit can maintain its polarized quantum state, the more quantum operations it can perform, which makes the quantum computer more powerful.

Why start with a million qubits?

We believed we had cracked the code for building a million-qubit quantum computer, Dr. Shadbolt said. Even though that's a huge number, the secret seemed simple. All we had to do was use the same process as the one being used to put billions of transistors into cell phones. We felt a large quantum computer wouldnt exist in our lifetime unless we figured out how to build it in a semiconductor foundry. That idea has been turned into reality. We are now building quantum chips next to laptops and cell phone chips on the GlobalFoundries 300-millimeter platform.

According to Dr. Shadbolt, PsiQuantums custom fabrication line has made much progress. Surprisingly, building a million-qubit quantum machine in a foundry has many of the same non-quantum issues as assembling a classical supercomputer, including chip yields, reliability, high-throughput testing, packaging, and cooling albeit to cryogenic temperatures.

From the time that our first GlobalFoundries announcement was made until now, we've produced huge amounts of silicon, Dr. Shadbolt said. Weve done seven tapeouts in total and were now seeing hundreds and hundreds of wafers of silicon coming through our door. We are investing heavily in packaging, assembly systems, integration, and fiber attachment to ensure the highest efficiency of light flowing in and out of the chip.

PsiQuantum is performing a great deal of ongoing research as well as continually improving the performance of photonic components and processes. In addition to high-performance optical components, the technologies that enable the process are also very important. A few enablers include optical switches, fiber-to-chip interconnects, and bonding methods.

We have greatly improved the efficiency of our photon detectors over the last few tapeouts at GlobalFoundries, Dr. Shadbolt explained. Were constantly working to prevent fewer and fewer photons from being lost from the system. We also have driven waveguide losses to extremely low levels in our recent chips.

There is much innovation involved. Our light source for single photons is a good example. We shine laser light directly into the chip to run the single photon sources. The laser is about a trillion times more intense than the single photons we need to detect, so we must attenuate light on that chip by a factor of about a trillion.

Dr. Shadbolt attributes PsiQuantums manufacturing success to GlobalFoundries. From experience, he knows there is a significant difference between a second-tier foundry and a first-tier foundry like GlobalFoundries. Building chips needed by PsiQuantum can only be built with an extremely mature manufacturing process.

PsiQuantum has two demanding requirements. We need a huge number of components, and we need those components to consistently meet extremely demanding performance requirements. There are very few partners in the world who can reliably achieve something like this, and we always knew that partnering with a mature manufacturer like GlobalFoundries would be key to our strategy.

The partnership has also been beneficial for GlobalFoundries because it has gained additional experience with new technologies by adding PsiQuantums photonic processes to the foundry.

The end is in sight

According to Dr. Shadbolt, the original question of whether large numbers of quantum devices could be built in a foundry is no longer an issue as routinely demonstrated by its output of silicon. However, inserting new devices into the manufacturing flow has always been difficult. It is slow and it is very expensive. Nanowire single photon detectors are an example of a development that came directly from the university lab and was inserted into the manufacturing process.

PsiQuantums semiconductor roadmap only has a few remaining items to complete. Since a million qubits wont fit on a single chip, the quantum computer will require multiple quantum processor chips to be interconnected with optical fibers and facilitated by ultra-high-performance optical switches to allow teleportation and entanglement of single photon operations between chips.

What remains is the optical switch, Dr. Shadbolt said. You might ask why photonic quantum computing people have never built anything at scale? Or why they havent demonstrated very large entangled states? The reason is that a special optical switch is needed, but none exists. It must have very high performance, better than any existing state-of-the-art optical switch such as those used for telecom networking. Its a classical device, and its only function will be to route light between waveguides, but it must be done with extremely low loss and at very high speed. It must be a really, really good optical switch.

If it cant be bought, then it must be built

Implementing an optical switch with the right specs is a success-or-fail item for PsiQuantum. Since a commercial optical switch doesnt exist that fits the application needs, PsiQuantum was left with no choice but to build one. For the past few years, its management has been heavily investing in developing a very high-performance optical switch.

Dr. Shadbolt explained: I believe this is one of the most exciting things PsiQuantum is doing. Building an extremely high-performance optical switch is the next biggest thing on our roadmap. We believe it is the key to unlocking the huge promise of optical quantum computing.

Summary

PsiQuantum was founded on the belief that photonics was the right technology for building a fault tolerant quantum machine with a million qubits and that the proper approach was based on semiconductor manufacturing. In contrast to NISQ quantum computers, the founders wanted to avoid building incrementally larger and larger machines over time.

Considering the overall process needed to build a million-qubit quantum computer, its high degree of complexity, and the lack of proven tools and processes to do it with, PsiQuantum has made amazing progress since it first formed the company.

It established a true partnership with one of the best foundries in the world and produced seven tapeouts and funded a half dozen new tools to build a first-of-its-kind wafer manufacturing process, incorporating superconducting single photon detectors into a regular silicon-photonic chip.

And today, it is answering yet another challenge by building an optical switch to fill a void where the needed product doesnt exist.

It is no surprise that an ultra- high-performance optical switch is a key part of PsiQuantums plans to build a scalable million qubit quantum computer. Other quantum companies are also planning to integrate similar optical switching technology to scale modular QPU architectures within the decade. The high-performance optical switch PsiQuantum is developing could someday connect tens of thousands of quantum processing units in a future multi-million qubit quantum data center. As a standalone product, it could also be a source of additional revenue should PsiQuantum choose to market it.

Once the optical switch has been built, it will then need to be enabled into GlobalFoundries manufacturing flow. That is the last step needed to complete PsiQuantums foundry assembly process and then it will be ready to produce photonic quantum computer chips.

But even with a complete end-to-end manufacturing process, significantly more time will be needed to construct a full-blown fault-tolerant quantum computer. It will remain for PsiQuantum to build complete quantum computers around chips produced by GlobalFoundries. For that, it will need a trained workforce and a location and infrastructure where large qubit photonic quantum computers can be assembled, integrated, tested, and distributed.

Based on the amount of post-foundry work, development of the optical switch, and assembly that remains, and assuming no major technology problems or delays occur, I believe it will be after mid-decade before a photonic quantum computer of any scale can be offered by PsiQuantum.

Ill wrap this up with comments made by Dr. Shadbolt during our discussion about the optical switch. I believe it demonstrates why PsiQuantum has been, and will continue to be successful:

Even though the optical switch will obviously be a very powerful generic technology of interest to others, we are not interested in its generic usefulness. We are only interested in the fact that it will allow us to build a quantum computer that outperforms every supercomputer on the planet. That is our singular goal.

Paul Smith-Goodson is Vice President and Principal Analyst for quantum computing, artificial intelligence and space at Moor Insights and Strategy. You can follow him on Twitter for more current information on quantum, AI, and space.

Note: Moor Insights & Strategy writers and editors may have contributed to this article.

Moor Insights & Strategy, like all research and tech industry analyst firms, provides or has provided paid services to technology companies. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking, and speaking sponsorships. The company has had or currently has paid business relationships with 88, Accenture, A10 Networks, Advanced Micro Devices, Amazon, Amazon Web Services, Ambient Scientific, Anuta Networks, Applied Brain Research, Applied Micro, Apstra, Arm, Aruba Networks (now HPE), Atom Computing, AT&T, Aura, Automation Anywhere, AWS, A-10 Strategies, Bitfusion, Blaize, Box, Broadcom, C3.AI, Calix, Campfire, Cisco Systems, Clear Software, Cloudera, Clumio, Cognitive Systems, CompuCom, Cradlepoint, CyberArk, Dell, Dell EMC, Dell Technologies, Diablo Technologies, Dialogue Group, Digital Optics, Dreamium Labs, D-Wave, Echelon, Ericsson, Extreme Networks, Five9, Flex, Foundries.io, Foxconn, Frame (now VMware), Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries, Revolve (now Google), Google Cloud, Graphcore, Groq, Hiregenics, Hotwire Global, HP Inc., Hewlett Packard Enterprise, Honeywell, Huawei Technologies, IBM, Infinidat, Infosys, Inseego, IonQ, IonVR, Inseego, Infosys, Infiot, Intel, Interdigital, Jabil Circuit, Keysight, Konica Minolta, Lattice Semiconductor, Lenovo, Linux Foundation, Lightbits Labs, LogicMonitor, Luminar, MapBox, Marvell Technology, Mavenir, Marseille Inc, Mayfair Equity, Meraki (Cisco), Merck KGaA, Mesophere, Micron Technology, Microsoft, MiTEL, Mojo Networks, MongoDB, MulteFire Alliance, National Instruments, Neat, NetApp, Nightwatch, NOKIA (Alcatel-Lucent), Nortek, Novumind, NVIDIA, Nutanix, Nuvia (now Qualcomm), onsemi, ONUG, OpenStack Foundation, Oracle, Palo Alto Networks, Panasas, Peraso, Pexip, Pixelworks, Plume Design, PlusAI, Poly (formerly Plantronics), Portworx, Pure Storage, Qualcomm, Quantinuum, Rackspace, Rambus, Rayvolt E-Bikes, Red Hat, Renesas, Residio, Samsung Electronics, Samsung Semi, SAP, SAS, Scale Computing, Schneider Electric, SiFive, Silver Peak (now Aruba-HPE), SkyWorks, SONY Optical Storage, Splunk, Springpath (now Cisco), Spirent, Splunk, Sprint (now T-Mobile), Stratus Technologies, Symantec, Synaptics, Syniverse, Synopsys, Tanium, Telesign,TE Connectivity, TensTorrent, Tobii Technology, Teradata,T-Mobile, Treasure Data, Twitter, Unity Technologies, UiPath, Verizon Communications, VAST Data, Ventana Micro Systems, Vidyo, VMware, Wave Computing, Wellsmith, Xilinx, Zayo, Zebra, Zededa, Zendesk, Zoho, Zoom, and Zscaler. Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is an investor in dMY Technology Group Inc. VI, Dreamium Labs, Groq, Luminar Technologies, MemryX, and Movandi.

Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is an investor in dMY Technology Group Inc. VI, Dreamium Labs, Groq, Luminar Technologies, MemryX, and Movand

Continued here:
PsiQuantum Has A Goal For Its Million Qubit Photonic Quantum Computer To Outperform Every Supercomputer On The Planet - Forbes

Read More..

Zapata Computing and the University of Hull Continue Collaboration on Quantum-Ready Space Exploration – HPCwire

BOSTON, Sept. 20, 2022 Zapata Computing today announced that it has made significant headway in its mission to get the University of Hull quantum-ready for future space exploration. One year into the collaboration both teams have seen enough progress to extend their plans for expanding the search for indicators of life in deep space.

Together, Zapata and the University of Hull developed new techniques to extrapolate meaningful data from noisy quantum devices and used it to calculate the ro-vibrational spectrum of hydrogen to obtain results that are comparable with the state-of-the-art classical simulations, as well as the experimental results. The results obtained with these new quantum techniques can already be used to detect molecular hydrogen in space.

A big part of the progress is due to the University of Hulls successful migration of Big Compute capabilities from classical to quantum computers. Big Compute is Zapatas term for the market category for heterogeneous and distributed compute resources needed to address enterprise and other technologically advanced organizations most computationally complex problems. It builds on previous technical revolutions like Big Data and AI and leverages a wide spectrum of classical (e.g., GPU, TPU, CPU), high-performance (HPC) and quantum compute resources (e.g., quantum-inspired computers, NISQ devices, fault-tolerant quantum computers).

In practical terms, this means that when more powerful and fault-tolerant quantum computers are available, the team of scientists at the University of Hull will be able to greatly increase the range of their exploration, the complexity and number of molecules that they can search for, and the speed with which they analyze their findings as they search for life beyond planet Earth.

The scale of what we are trying to accomplish today is daunting, said Dr. David Benoit, senior lecturer in Molecular Physics and Astrochemistry at the University of Hull. There are over 16,000 different life-indicating molecules that were searching for in space, but we could increase our search significantly with quantum computers as they become more powerful in the future. And were going to need that power. Were not looking for a needle in a haystack here. That would be easy. This effort is more like looking for a speck of dust in a warehouse through a straw.

Throughout the project, the teams have achieved several new discoveries and scientific breakthroughs. These discoveries led them to expect that the quantum algorithm will scale better than the classical one in the future, making it possible to study larger molecules that would not be possible with a classical computer. Zapata Computing and the University of Hull also documented this research and recently published a paper regarding the findings titled, A pathway to accurate potential energy curves on NISQ devices. The teams will also share the overview of the project and the results of the first year of work at Quantum.Tech London in their presentation on September 20 titled, Using quantum computers to look for alien life in deep space.

The sheer scale of what the University of Hull is trying to accomplish technically is a clear indication that the need for Big Compute capabilities today are critical to prepare for the quantum future ahead, said Christopher Savoie, CEO and co-founder of Zapata Computing. Theres no question that the discovery of life in deep space is difficult, but its a challenge that is perfect for a quantum computer and there are steps that the University of Hull is taking, similar to those many enterprises are taking, to make iterative progress and prep for these more powerful machines as they come online.

About Zapata Computing

Zapata Computing, Inc. is the leading enterprise quantum software company. The Companys Orquestra platform supports the research, development, and deployment of quantum-ready applications for enterprises most computationally complex problems. Zapata has pioneered new methods in ML, optimization, and simulation to maximize value from near-term quantum devices, and partners closely with ecosystem hardware providers such as Amazon, D-Wave, Google, Quantinuum, IBM, IonQ and Rigetti. Zapata was founded in 2017 and is headquartered in Boston, Massachusetts.

Source: Zapata Computing

Originally posted here:
Zapata Computing and the University of Hull Continue Collaboration on Quantum-Ready Space Exploration - HPCwire

Read More..