Page 2,061«..1020..2,0602,0612,0622,063..2,0702,080..»

What is quantum computing? – TechTarget

Quantum computing is an area of study focused on the development of computer based technologies centered around the principles ofquantum theory. Quantum theory explains the nature and behavior of energy and matter on thequantum(atomic and subatomic) level. Quantum computing uses a combination ofbitsto perform specific computational tasks. All at a much higher efficiency than their classical counterparts. Development ofquantum computersmark a leap forward in computing capability, with massive performance gains for specific use cases. For example quantum computing excels at like simulations.

The quantum computer gains much of its processing power through the ability for bits to be in multiple states at one time. They can perform tasks using a combination of 1s, 0s and both a 1 and 0 simultaneously. Current research centers in quantum computing include MIT, IBM, Oxford University, and the Los Alamos National Laboratory. In addition, developers have begun gaining access toquantum computers through cloud services.

Quantum computing began with finding its essential elements. In 1981, Paul Benioff at Argonne National Labs came up with the idea of a computer that operated with quantum mechanical principles. It is generally accepted that David Deutsch of Oxford University provided the critical idea behind quantum computing research. In 1984, he began to wonder about the possibility of designing a computer that was based exclusively on quantum rules, publishing a breakthrough paper a few months later.

Quantum Theory

Quantum theory's development began in 1900 with a presentation by Max Planck. The presentation was to the German Physical Society, in which Planck introduced the idea that energy and matter exists in individual units. Further developments by a number of scientists over the following thirty years led to the modern understanding of quantum theory.

Quantum Theory

Quantum theory's development began in 1900 with a presentation by Max Planck. The presentation was to the German Physical Society, in which Planck introduced the idea that energy and matter exists in individual units. Further developments by a number of scientists over the following thirty years led to the modern understanding of quantum theory.

The Essential Elements of Quantum Theory:

Further Developments of Quantum Theory

Niels Bohr proposed the Copenhagen interpretation of quantum theory. This theory asserts that a particle is whatever it is measured to be, but that it cannot be assumed to have specific properties, or even to exist, until it is measured. This relates to a principle called superposition. Superposition claims when we do not know what the state of a given object is, it is actually in all possible states simultaneously -- as long as we don't look to check.

To illustrate this theory, we can use the famous analogy of Schrodinger's Cat. First, we have a living cat and place it in a lead box. At this stage, there is no question that the cat is alive. Then throw in a vial of cyanide and seal the box. We do not know if the cat is alive or if it has broken the cyanide capsule and died. Since we do not know, the cat is both alive and dead, according to quantum law -- in a superposition of states. It is only when we break open the box and see what condition the cat is in that the superposition is lost, and the cat must be either alive or dead.

The principle that, in some way, one particle can exist in numerous states opens up profound implications for computing.

A Comparison of Classical and Quantum Computing

Classical computing relies on principles expressed by Boolean algebra; usually Operating with a 3 or 7-modelogic gateprinciple. Data must be processed in an exclusive binary state at any point in time; either 0 (off / false) or 1 (on / true). These values are binary digits, or bits. The millions of transistors and capacitors at the heart of computers can only be in one state at any point. In addition, there is still a limit as to how quickly these devices can be made to switch states. As we progress to smaller and faster circuits, we begin to reach the physical limits of materials and the threshold for classical laws of physics to apply.

The quantum computer operates with a two-mode logic gate:XORand a mode called QO1 (the ability to change 0 into a superposition of 0 and 1). In a quantum computer, a number of elemental particles such as electrons or photons can be used. Each particle is given a charge, or polarization, acting as a representation of 0 and/or 1. Each particle is called a quantum bit, or qubit. The nature and behavior of these particles form the basis of quantum computing and quantum supremacy. The two most relevant aspects of quantum physics are the principles of superposition andentanglement.

Superposition

Think of a qubit as an electron in a magnetic field. The electron's spin may be either in alignment with the field, which is known as aspin-upstate, or opposite to the field, which is known as aspin-downstate. Changing the electron's spin from one state to another is achieved by using a pulse of energy, such as from alaser. If only half a unit of laser energy is used, and the particle is isolated the particle from all external influences, the particle then enters a superposition of states. Behaving as if it were in both states simultaneously.

Each qubit utilized could take a superposition of both 0 and 1. Meaning, the number of computations a quantum computer could take is 2^n, where n is the number of qubits used. A quantum computer comprised of 500 qubits would have a potential to do 2^500 calculations in a single step. For reference, 2^500 is infinitely more atoms than there are in the known universe. These particles all interact with each other via quantum entanglement.

In comparison to classical, quantum computing counts as trueparallel processing. Classical computers today still only truly do one thing at a time. In classical computing, there are just two or more processors to constitute parallel processing.EntanglementParticles (like qubits) that have interacted at some point retain a type can be entangled with each other in pairs, in a process known ascorrelation. Knowing the spin state of one entangled particle - up or down -- gives away the spin of the other in the opposite direction. In addition, due to the superposition, the measured particle has no single spin direction before being measured. The spin state of the particle being measured is determined at the time of measurement and communicated to the correlated particle, which simultaneously assumes the opposite spin direction. The reason behind why is not yet explained.

Quantum entanglement allows qubits that are separated by large distances to interact with each other instantaneously (not limited to the speed of light). No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated.

Taken together, quantum superposition and entanglement create an enormously enhanced computing power. Where a 2-bit register in an ordinary computer can store only one of four binary configurations (00, 01, 10, or 11) at any given time, a 2-qubit register in a quantum computer can store all four numbers simultaneously. This is because each qubit represents two values. If more qubits are added, the increased capacity is expanded exponentially.

Quantum Programming

Quantum computing offers an ability to write programs in a completely new way. For example, a quantum computer could incorporate a programming sequence that would be along the lines of "take all the superpositions of all the prior computations." This would permit extremely fast ways of solving certain mathematical problems, such as factorization of large numbers.

The first quantum computing program appeared in 1994 by Peter Shor, who developed a quantum algorithm that could efficiently factorize large numbers.

The Problems - And Some Solutions

The benefits of quantum computing are promising, but there are huge obstacles to overcome still. Some problems with quantum computing are:

There are many problems to overcome, such as how to handle security and quantum cryptography. Long time quantum information storage has been a problem in the past too. However, breakthroughs in the last 15 years and in the recent past have made some form of quantum computing practical. There is still much debate as to whether this is less than a decade away or a hundred years into the future. However, the potential that this technology offers is attracting tremendous interest from both the government and the private sector. Military applications include the ability to break encryptions keys via brute force searches, while civilian applications range from DNA modeling to complex material science analysis.

Read the rest here:
What is quantum computing? - TechTarget

Read More..

National Security Memorandum on Promoting United States Leadership in …

NATIONAL SECURITY MEMORANDUM/NSM-10

MEMORANDUM FOR THE VICE PRESIDENT

THE SECRETARY OF STATE

THE SECRETARY OF THE TREASURY

THE SECRETARY OF DEFENSE

THE ATTORNEY GENERAL

THE SECRETARY OF COMMERCE

THE SECRETARY OF ENERGY

THE SECRETARY OF HOMELAND SECURITY

THE ASSISTANT TO THE PRESIDENT AND CHIEF OF STAFF

THE DIRECTOR OF THE OFFICE OF MANAGEMENT BUDGET

THE DIRECTOR OF NATIONAL INTELLIGENCE

THE DIRECTOR OF THE CENTRAL INTELLIGENCE AGENCY

THE ASSISTANT TO THE PRESIDENT FOR NATIONAL

SECURITY AFFAIRS

THE COUNSEL TO THE PRESIDENT

THE ASSISTANT TO THE PRESIDENT FOR ECONOMIC

POLICY AND DIRECTOR OF THE NATIONAL ECONOMIC

COUNCIL

THE DIRECTOR OF THE OFFICE OF SCIENCE AND

TECHNOLOGY POLICY

THE NATIONAL CYBER DIRECTOR

THE CHAIRMAN OF THE JOINT CHIEFS OF STAFF

THE DIRECTOR OF THE FEDERAL BUREAU OF

INVESTIGATION

THE DIRECTOR OF THE NATIONAL SECURITY AGENCY

THE DIRECTOR OF THE NATIONAL INSTITUTE OF

STANDARDS AND TECHNOLOGY

THE DIRECTOR OF THE CYBERSECURITY AND

INFRASTRUCTURE SECURITY AGENCY

SUBJECT: Promoting United States Leadership in Quantum

Computing While Mitigating Risks to Vulnerable

Cryptographic Systems

This memorandum outlines my Administrations policies and initiatives related to quantum computing. It identifies key steps needed to maintain the Nations competitive advantage in quantum information science (QIS), while mitigating the risks of quantum computers to the Nations cyber, economic, and national security. It directs specific actions for agencies to take as the United States begins the multi-year process of migrating vulnerable computer systems to quantum-resistant cryptography. A classified annex to this memorandum addresses sensitive national security issues.

Section 1. Policy. (a) Quantum computers hold the potential to drive innovations across the American economy, from fields as diverse as materials science and pharmaceuticals to finance and energy. While the full range of applications of quantum computers is still unknown, it is nevertheless clear that Americas continued technological and scientific leadership will depend, at least in part, on the Nations ability to maintain a competitive advantage in quantum computing and QIS.

(b) Yet alongside its potential benefits, quantum computing also poses significant risks to the economic and national security of the United States. Most notably, a quantum computer of sufficient size and sophistication also known as a cryptanalytically relevant quantum computer (CRQC) will be capable of breaking much of the public-key cryptography used on digital systems across the United States and around the world. When it becomes available, a CRQC could jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure, and defeat security protocols for most Internet-based financial transactions.

(c) In order to balance the competing opportunities and risks of quantum computers, it is the policy of my Administration: (1) to maintain United States leadership in QIS, through continued investment, partnerships, and a balanced approach to technology promotion and protection; and (2) to mitigate the threat of CRQCs through a timely and equitable transition of the Nations cryptographic systems to interoperable quantumresistant cryptography.

(d) Additional guidance and directives may be required in the future as quantum computing technologies and their associated risks mature.

Sec. 2. Promoting United States Leadership. (a) The United States must pursue a whole-of-government and wholeofsociety strategy to harness the economic and scientific benefits of QIS, and the security enhancements provided by quantum-resistant cryptography. This strategy will require a coordinated, proactive approach to QIS research and development (R&D), an expansion of education and workforce programs, and a focus on developing and strengthening partnerships with industry, academic institutions, allies, and like-minded nations.

(b) The United States must seek to encourage transformative and fundamental scientific discoveries through investments in core QIS research programs. Investments should target the discovery of new quantum applications, new approaches to quantum-component manufacturing, and advances in quantumenabling technologies, such as photonics, nanofabrication, and cryogenic and semiconductor systems.

(c) The United States must seek to foster the next generation of scientists and engineers with quantum-relevant skill sets, including those relevant to quantum-resistant cryptography. Education in QIS and related cybersecurity principles should be incorporated into academic curricula at all levels of schooling to support the growth of a diverse domestic workforce. Furthermore, it is vital that we attract and retain talent and encourage career opportunities that keep quantum experts employed domestically.

(d) To promote the development of quantum technology and the effective deployment of quantum-resistant cryptography, theUnited States must establish partnerships with industry; academia; and State, local, Tribal, and territorial (SLTT) governments. These partnerships should advance joint R&D initiatives and streamline mechanisms for technology transfer between industry and government.

(e) The United States must promote professional and academic collaborations with overseas allies and partners. This international engagement is essential for identifying and following global QIS trends and for harmonizing quantum security and protection programs.

(f) In support of these goals, within 90 days of the date of this memorandum, agencies that fund research in, develop, or acquire quantum computers shall coordinate with the Director of the Office of Science and Technology Policy to ensure a coherent national strategy for QIS promotion and technology protection, including for workforce issues. To facilitate this coordination, all such agencies shall identify a liaison to the National Quantum Coordination Office to share information and best practices, consistent with section 102(b)(3) of the National Quantum Initiative Act (Public Law 115-368) and section 6606 of the National Defense Authorization Act for Fiscal Year 2022 (Public Law 117-81). All coordination efforts shall be undertaken with appropriate protections for sensitive and classified information and intelligence sources and methods.

Sec. 3. Mitigating the Risks to Encryption. (a) Any digital system that uses existing public standards for publickey cryptography, or that is planning to transition to such cryptography, could be vulnerable to an attack by a CRQC. To mitigate this risk, the United States must prioritize the timely and equitable transition of cryptographic systems to quantum-resistant cryptography, with the goal of mitigating as much of the quantum risk as is feasible by 2035. Currently, the Director of the National Institute of Standards and Technology (NIST) and the Director of the National Security Agency (NSA), in their capacity as the National Manager for National Security Systems (National Manager), are each developing technical standards for quantumresistant cryptography for their respective jurisdictions. The first sets of these standards are expected to be released publicly by 2024.

(b) Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards. This effort is an imperative across all sectors of the United States economy, from government to critical infrastructure, commercial services to cloud providers, and everywhere else that vulnerable public-key cryptography is used.

(c) Consistent with these goals:

(i) Within 90 days of the date of this memorandum, the Secretary of Commerce, through the Director of NIST, shall initiate an open working group with industry, including critical infrastructure owners and operators, and other stakeholders, as determined by the Director of NIST, to further advance adoption of quantum-resistant cryptography. This working group shall identify needed tools and data sets, and other considerations to inform the development by NIST of guidance and best practices to assist with quantumresistant cryptography planning and prioritization. Findings of this working group shall be provided, on an ongoing basis, to the Director of the Office of Management and Budget (OMB), the Assistant to the President for National Security Affairs (APNSA), and the National Cyber Director to incorporate into planning efforts.

(ii) Within 90 days of the date of this memorandum, the Secretary of Commerce, through the Director of NIST, shall establish a Migration to Post-Quantum Cryptography Project at the National Cybersecurity Center of Excellence to work with the private sector to address cybersecurity challenges posed by the transition to quantum-resistant cryptography. This project shall develop programs for discovery and remediation of any system that does not use quantum-resistant cryptography or that remains dependent on vulnerable systems.

(iii) Within 180 days of the date of this memorandum, and annually thereafter, the Secretary of Homeland Security, through the Director of the Cybersecurity and Infrastructure Security Agency (CISA), and in coordination with Sector Risk Management Agencies, shall engage with critical infrastructure and SLTT partners regarding the risks posed by quantum computers, and shall provide an annual report to the Director of OMB, the APNSA, and the National Cyber Director that includes recommendations for accelerating those entities migration to quantum-resistant cryptography.

(iv) Within 180 days of the date of this memorandum, and on an ongoing basis, the Director of OMB, in consultation with the Director of CISA, the Director of NIST, the National Cyber Director, and the Director of NSA, shall establish requirements for inventorying all currently deployed cryptographic systems, excluding National Security Systems (NSS). These requirements shall include a list of key information technology (IT) assets to prioritize, interim benchmarks, and a common (and preferably automated) assessment process for evaluating progress on quantum-resistant cryptographic migration in IT systems.

(v) Within 1 year of the date of this memorandum, and on an annual basis thereafter, the heads of all Federal Civilian Executive Branch (FCEB) Agencies shall deliver to the Director of CISA and the National Cyber Director an inventory of their IT systems that remain vulnerable to CRQCs, with a particular focus on High Value Assets and High Impact Systems. Inventories should include current cryptographic methods used on IT systems, including system administrator protocols, non-security software and firmware that require upgraded digital signatures, and information on other key assets.

(vi) By October 18, 2023, and on an annual basis thereafter, the National Cyber Director shall, based on the inventories described in subsection 3(c)(v) of this memorandum and in coordination with the Director of CISA and the Director of NIST, deliver a status report to the APNSA and the Director of OMB on progress made by FCEB Agencies on their migration of non-NSS IT systems to quantum-resistant cryptography. This status report shall include an assessment of the funding necessary to secure vulnerable IT systems from the threat posed by adversarial access to quantum computers, a description and analysis of ongoing coordination efforts, and a strategy and timeline for meeting proposed milestones.

(vii) Within 90 days of the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, andon an annual basis thereafter, as needed, the Secretary of Commerce, through the Director of NIST, shall release a proposed timeline for the deprecation of quantum-vulnerable cryptography in standards, with the goal of moving the maximum number of systems off quantum-vulnerable cryptography within a decade of the publication of the initial set of standards. The Director of NIST shall work with the appropriate technical standards bodies to encourage interoperability of commercial cryptographic approaches.

(viii) Within 1 year of the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, the Director of OMB, in coordination with the Director of CISA and the Director of NIST, shall issue a policy memorandum requiring FCEB Agencies to develop a plan to upgrade their non-NSS IT systems to quantum-resistant cryptography. These plans shall be expeditiously developed and be designed to address the most significant risks first. The Director of OMB shall work with the head of each FCEB Agency to estimate the costs to upgrade vulnerable systems beyond already planned expenditures, ensure that each plan is coordinated and shared among relevant agencies to assess interoperability between solutions, and coordinate with the National Cyber Director to ensure plans are updated accordingly.

(ix) Until the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, the heads of FCEB Agencies shall not procure any commercial quantum-resistant cryptographic solutions for use in IT systems supporting enterprise and mission operations. However, to assist with anticipating potential compatibility issues, the heads of such FCEB Agencies should conduct tests of commercial solutions that have implemented pre-standardized quantum-resistant cryptographic algorithms. These tests will help identify interoperability or performance issues that may occur in Federal environments at an early stage and will contribute to the mitigation of those issues. The heads of such FCEB Agencies should continue to implement and, where needed, upgrade existing cryptographic implementations, but should transition to quantum-resistant cryptography only once the first set of NIST standards for quantum-resistant cryptography is complete and implemented in commercial products. Conformance with international standards should be encouraged, and may be required for interoperability.

(x) Within 1 year of the date of this memorandum, and annually thereafter, the Director of NSA, serving in its capacity as the National Manager, in consultation with the Secretary of Defense and the Director of National Intelligence, shall provide guidance on quantum-resistant cryptography migration, implementation, and oversight for NSS. This guidance shall be consistent with National Security Memorandum/NSM-8 (Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems). The National Manager shall share best practices and lessons learned with the Director of OMB and the National Cyber Director, as appropriate.

(xi) Within 1 year of the date of this memorandum, and on an ongoing basis, and consistent with section 1 of NSM-8, the heads of agencies operating NSS shall identify and document all instances where quantum-vulnerable cryptography is used by NSS and shall provide this information to the National Manager.

(xii) Within 180 days of issuance by the National Manager of its standards on quantum-resistant cryptography referenced in section 3(a) of this memorandum, and annually thereafter, the National Manager shall release an official timeline for the deprecation of vulnerable cryptography in NSS, until the migration to quantum-resistant cryptography is completed.

(xiii) Within 1 year of issuance by the National Manager of its standards on quantum-resistant cryptography for referenced in subsection 3(a) of this memorandum, and annually thereafter, the heads of agencies operating or maintaining NSS shall submit to the National Manager, and, as appropriate, the Department of Defense Chief Information Officer or the Intelligence Community Chief Information Officer, depending on their respective jurisdictions, an initial plan to transition to quantumresistant cryptography in all NSS. These plans shall be updated annually and shall include relevant milestones, schedules, authorities, impediments, funding requirements, and exceptions authorized by the head of the agency in accordance with section 3 of NSM-8 and guidance from the National Manager.

(xiv) By December 31, 2023, agencies maintaining NSS shall implement symmetric-key protections (e.g., High Assurance Internet Protocol Encryptor (HAIPE) exclusion keys or VPN symmetric key solutions) to provide additional protection for quantum-vulnerable key exchanges, where appropriate and in consultation with the National Manager. Implementation should seek to avoid interference with interoperability or other cryptographic modernization efforts.

(xv) By December 31, 2023, the Secretary of Defense shall deliver to the APNSA and the Director of OMB an assessment of the risks of quantum computing to the defense industrial base and to defense supply chains, along with a plan to engage with key commercial entities to upgrade their IT systems to achieve quantum resistance.

Sec. 4. Protecting United States Technology. (a) In addition to promoting quantum leadership and mitigating the risks of CRQCs, the United States Government must work to safeguard relevant quantum R&D and intellectual property (IP) and to protect relevant enabling technologies and materials. Protection mechanisms will vary, but may include counterintelligence measures, well-targeted export controls, and campaigns to educate industry and academia on the threat of cybercrime and IP theft.

(b) All agencies responsible for either promoting or protecting QIS and related technologies should understand the security implications of adversarial use and consider those security implications when implementing new policies, programs, and projects.

(c) The United States should ensure the protection of U.S.developed quantum technologies from theft by our adversaries. This will require campaigns to educate industry, academia, and SLTT partners on the threat of IP theft and on the importance of strong compliance, insider threat detection, and cybersecurity programs for quantum technologies. As appropriate, Federal law enforcement agencies and other relevant agencies should investigate and prosecute actors who engage in the theft of quantum trade secrets or who violate United States export control laws. To support efforts to safeguard sensitive information, Federal law enforcement agencies should exchange relevant threat information with agencies responsible for developing and promoting quantum technologies.

(d) Consistent with these goals, by December 31, 2022, the heads of agencies that fund research in, develop, or acquire quantum computers or related QIS technologies shall develop comprehensive technology protection plans to safeguard QIS R&D, acquisition, and user access. Plans shall be coordinated across agencies, including with Federal law enforcement, to safeguard quantum computing R&D and IP, acquisition, and user access. These plans shall be updated annually and provided to the APNSA, the Director of OMB, and the Co-Chairs of the National Science and Technology Council Subcommittee on Economic and Security Implications of Quantum Science.

Sec. 5. Definitions. For purposes of this memorandum:

(a) the term agency has the meaning ascribed to it under 44 U.S.C. 3502;

(b) the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the UnitedStates that their incapacitation or destruction would have a debilitating effect on the Nations security, economy, public health and safety, or any combination thereof;

(c) the term cryptographic agility means a design feature that enables future updates to cryptographic algorithms and standards without the need to modify or replace the surrounding infrastructure;

(d) the term cryptanalytically relevant quantum computer or CRQC means a quantum computer capable of undermining current public-key cryptographic algorithms;

(e) the term Federal Civilian Executive Branch Agency or FCEB Agency means any agency except the Department of Defense or agencies in the Intelligence Community;

(f) the term high value asset means information or an information system that is so critical to an organization that the loss or corruption of this information, or loss of access to the system, would have serious impacts on the organizations ability to perform its mission or conduct business;

(g) the term high impact system means an information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a Federal Information Processing Standards (FIPS) 199 potential impact value of high;

(h) the term information technology or IT has the meaning ascribed to it under 44 U.S.C. 3502;

(i) the term National Security Systems or NSS has the meaning ascribed to it in 44 U.S.C 3552(b)(6) and shall also include other Department of Defense and Intelligence Community systems, as described in 44 U.S.C. 3553(e)(2) and 44 U.S.C.3553(e)(3);

(j) the term quantum computer means a computer utilizing the collective properties of quantum states, such as superposition, interference and entanglement, to perform calculations. The foundations in quantum physics give a quantum computer the ability to solve a subset of hard mathematical problems at a much faster rate than a classical (i.e., nonquantum) computer;

(k) the term quantum information sciences or QIS has the meaning ascribed to it under 15 U.S.C. 8801(6) and means the study and application of the laws of quantum physics for the storage, transmission, manipulation, computing, or measurement of information; and

(l) the term quantum-resistant cryptography means those cryptographic algorithms or methods that are assessed not to be specifically vulnerable to attack by either a CRQC or classical computer. This is also referred to as post-quantum cryptography.

Sec. 6. General Provisions. (a) Nothing in this memorandum shall be construed to impair or otherwise affect:

(i) the authority granted by law to an executive department or agency, or the head thereof, to include the protection of intelligence sources and methods; or

(ii) the functions of the Director of OMB relating to budgetary, administrative, or legislative proposals.

(b) This memorandum shall be implemented consistent with applicable law and subject to the availability of appropriations.

(c) This memorandum shall also be implemented without impeding the conduct or support of intelligence activities, and all implementation measures shall be designed to be consistent with appropriate protections for sensitive information and intelligence sources and methods.

(d) This memorandum is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the UnitedStates, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

JOSEPH R. BIDEN JR.

Continued here:
National Security Memorandum on Promoting United States Leadership in ...

Read More..

The Importance of IBM’s Expanded Quantum Roadmap – Datamation

IBMs recently expanded its Quantum Roadmap. Its important, because it shows that if you arent developing quantum programming skills now, youre already behind.

Up until now, most of us were still thinking that we had around a decade before wed need to be competent in this space to remain competitive, but this roadmap suggests the need for these skills may be necessary as early as 2025. Building competence in a revolutionary technology that has little in common with existing computing concepts is going to take considerable training.

Lets cover the state of the market according to IBM and why you are increasingly exposed if you arent spinning up a core team skilled in quantum computing, as a hedge against its premature emergence tomorrow.

IBMs goals for 2022 are aggressive against the old timeline but right in line with the new one. They include:

Of these goals the most interesting to me is the creation of dynamic circuits. Dynamic circuits provide the bi-directional feedback of quantum measurements, which are used to direct the course of future operations. These dynamic circuits are critical to the flexibility of quantum computing and its ability to adapt to existing and future related workloads. These circuits extend into the hardware and are core to the future capability of quantum computing.

Second, of course, is the increase in quantum volume, which speaks to the capability and viability of quantum computing, and IBM and is on the critical path to quantum leadership when quantum computing finally rises to meet, and likely exceed, its expectations.

One very interesting part of this announcement is the emergence of quantum-centric computing. This is much like a supercharger or turbocharger on an engine but with a massively greater potential performance boost to existing high performance computing (HPC) and supercomputer platforms. This anticipates the creation of QPUs that will work in conjunction with CPUs and GPUs to create a level of performance unparalleled in modern times.

Focused on solving the worlds toughest problems, this new class of computers will be critical to both addressing current large-scale problems, like climate change, and future existential problems to humanity.

This wont be easy. IBM is effectively rewriting the rules surrounding the entire computing market, using quantum computing as the change agent. If successful, it could turn IBM into a powerhouse.

IBM is one of a handful of companies leading the charge to quantum-centric computing.

It has worked aggressively to develop, in parallel, both the technology and training necessary to advance this technology into the market and move it into the mainstream of computing. If successful, IBM will help pivot the market to this new, vastly higher performing technology. If the industry as a whole isnt ready for it, itll quickly fall behind.

Areas like classification and compliance at scale as well as the ability of governments to catch companies that arent compliant will increase dramatically, customer analysis will become more accurate, and predictive algorithms will become more accurate as well.

Companies that can deploy this technology once its ready will have a significant competitive advantage over those that cant. The time is now to spin up quantum computing expertise, so you know when and how to use this technology effectively when it becomes available.

See the original post here:
The Importance of IBM's Expanded Quantum Roadmap - Datamation

Read More..

PH community to host webinar on quantum computing – Backend News

OneQuantum Philippines will host Reinvent your Careers with Quantum Computing online on June 3, 2002, at 7 p.m.

John Barnes, founder of Entangled Positions, will be the speaker. Asher Manangan and Bobby Corpus, both of OneQuantum Philippines, will be the moderators.

Quantum computing will impact the future of every area in Academia and Industry, so the need for a quantum-capable workforce is great. Join us for a career session in Quantum Computing, with John Barnes, founder of Entangled Positions and President of OneQuantum UK, and learn how to reinvent your careers and take exciting opportunities in this field.

John Barnes is a recruiter, headhunter, and community builder. Having founded Entangled Positions, and previously Profecta Associates, he is also President of OneQuantum UK and OneQuantum Europe, Special Advisor for Workforce and Talent to the Quantum Strategy Institute, and host of the Entangled Discussions podcast.

Deconstructing Quantum Computing

RSVP here.

OneQuantum Philippines is a local chapter of the OneQuantum global community. It aims to make the Philippines a quantum-ready nation by educating students at an early age so it would be easy for them to acquire quantum computing skills. For more information, visit OneQuantum Philippines website.

Related Stories

See more here:
PH community to host webinar on quantum computing - Backend News

Read More..

Materials-Based Solution Ups the Speed for Photonic Computing – Photonics.com

ORLANDO, Fla., May 31, 2022 Researchers at the University of Central Florida (UCF) have introduced a previously undescribed class of topological insulators. The researchers increased the speed and efficiency of light as it flows through photonic circuits, in a demonstration that is poised to advance photonic quantum computing.

The UCF design diverges from traditional design approaches that introduce topological phases by using tailored, discrete coupling protocols or helical lattice motions. To improve the robustness of the topological features, the UCF team instead used connective chains with periodically modulated onsite potentials. It developed a phase structure to host multiple nontrivial topological phases associated with both Chern-type and anomalous chiral states. The team then laser-etched the chained, honeycomb lattice design onto silica.

Nodes in the design allowed the researchers to modulate the current without bending or stretching the photonic wires. This in turn allowed greater control over the flow of light and thus, more control over the information that flows into a photonic circuit.

The researchers confirmed their findings using imaging techniques and numerical simulations. In experiments carried out in photonic waveguide lattices, they discovered a strongly confined helical edge state that, owing to its origin in bulk flat bands, could be set into motion in a topologically protected fashion or halted at will, without compromising its adherence to individual lattice sites.

The topological insulator design, which the researchers call bimorphic, supports longer propagation lengths for information packets because it minimizes power losses. The researchers believe that by providing more control and richer features than traditional modulation techniques, their approach to designing bimorphic topological insulators could help bring light-based computing closer to reality.

Bimorphic topological insulators introduce a new paradigm shift in the design of photonic circuitry by enabling secure transport of light packets with minimal losses, researcher Georgios Pyrialakos said.

As the size of photonic circuits continues to shrink, topological insulators could be used to fit more processing power into a single circuit without overheating it. In the future, topological insulators could be used to protect and harness the power of fragile quantum information bits to realize quantum processing power hundreds of millions of times faster than conventional computers.

The research was published in Nature Materials (www.doi.org/10.1038/s41563-022-01238-w).

Visit link:
Materials-Based Solution Ups the Speed for Photonic Computing - Photonics.com

Read More..

BlackBerry and NXP Join Forces to Help Companies Prepare For and Prevent Y2Q Post-Quantum Cyber Attacks – BlackBerry

WATERLOO, ONTARIO May 25, 2022 BlackBerry Limited (NYSE: BB; TSX: BB)today announced it will provide support for quantum-resistant secure boot signatures for NXP Semiconductors (NASDAQ: NXPI) crypto-agile S32G vehicle networking processors in a demonstration to illustrate how to mitigate the risk of potential quantum computing attacks on in-vehicle software.

The new integration will allow software to be digitally signed using the National Institute of Standards and Technologys (NIST) recently endorsed CRYSTALS Dilithium digital signature scheme that will be quantum resistant, providing peace of mind to those relying on and delivering long lifecycle assets such as systems in critical infrastructure, industrial controls, aerospace and military electronics, telecommunications, transportation infrastructure, and connected cars. The collaboration is set to guard against an increasingly risky future when quantum computers will be able to easily break traditional code signing schemes.

For more information, register to attend the one hour Post-Quantum Cyber Attacks, how to Prepare and Prevent webinar on June 9, 2022 at 11:00 a.m. ET.

While quantum computing promises to deliver huge leaps forward in processing power, it also has the potential to render today's public key cryptography useless. In recent months, NATO, the White House and NIST have all taken steps to prepare for a Y2Q scenario in which quantum computers become weaponized by threat actors and many widely used security methods become useless against next-generation attacks.

The BlackBerry Certicom Code Signing and Key Management Server leverages the NXP S32G chips secure boot flow to achieve fast and agile quantum protection. Using quantum-resistant signature schemes such as Dilithium for low-level device firmware, over-the-air software updates and software bills of material (SBOMs) mitigates the risk of potential quantum computing attacks on critical software updates, addressing a major security concern for a number of industries.

As quantum computers continue to advance in development, its increasingly important to work to secure todays systems against these future threats, said Joppe Bos, Senior Principal Cryptographer at NXP Semiconductors. Collaborating with BlackBerry strengthens our solution to address the critical need to harden code signing and software update infrastructure against future cryptosystem vulnerabilities.

In the lead up to Y2K, US business spent upwards of $100 billion to avoid calamity and the issue was simply a matter of adding two digits to the date field. Y2Q, when quantum attacks become possible, is on another level, posing a significant threat to industries selling or operating long-lived assets with updatable software, said Jim Alfred, VP, BlackBerry Technology Solutions. NXP shares our vision of mitigating the risk of quantum computing concerns and, thanks to their support for hash-based signatures, together we can provide cybersecurity teams with the tools they need now to prevent their existing security measures from becoming obsolete.

To learn more about the Code Signing and Key Management Server and why BlackBerry Certicom technology is widely deployed in smartphone chips, smart meters, car telematics, and IoT devices, please visit http://www.certicom.com.

###

About BlackBerry

BlackBerry (NYSE: BB; TSX: BB) provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including over 195M vehicles. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security, endpoint management, encryption, and embedded systems. BlackBerrys vision is clear - to secure a connected future you can trust.

BlackBerry. Intelligent Security. Everywhere.

For more information, visit BlackBerry.com and follow @BlackBerry.

NXP and the NXP logo are trademarks ofNXP B.V. All other product or service names are the property of their respective owners. All rights reserved.2022 NXP B.V.

Trademarks, including but not limited to BLACKBERRY and EMBLEM Design are the trademarks or registered trademarks of BlackBerry Limited, and the exclusive rights to such trademarks are expressly reserved. All other trademarks are the property of their respective owners. BlackBerry is not responsible for any third-party products or services.

###

Media Contact:BlackBerry Media Relations+1 (519) 597-7273mediarelations@BlackBerry.com

See more here:
BlackBerry and NXP Join Forces to Help Companies Prepare For and Prevent Y2Q Post-Quantum Cyber Attacks - BlackBerry

Read More..

Quick Study: Artificial Intelligence Ethics and Bias – InformationWeek

Mention artificial intelligence to pretty much anyone and there's a good chance that the term that once seemed magical now spawns a queasy feeling. It generates thoughts of a computer stealing your job, technology companies spying on us, and racial, gender and economic bias.

So, how do we bring the magic back to AI? Maybe it comes down to people and things that humans actually do pretty well: thinking and planning. That's one finding that will become clear in a review of the articles in this Quick Study packed with InformationWeek articles focused on AI ethics and bias.

Yes, there are ways to develop and utilize AI in ethical manners, but they involve thinking through how your organization will use AI, how you will test it, and what your training data looks like. In these articles AI experts and companies that have succeeded with AI share their advice.

What You Need to Know About AI Ethics

Honesty is the best policy. The same is true when it comes to artificial intelligence. With that in mind, a growing number of enterprises are starting to pay attention to how AI can be kept from making potentially harmful decisions.

Why AI Ethics Is Even More Important Now

Contact-tracing apps are fueling more AI ethics discussions, particularly around privacy. The longer term challenge is approaching AI ethics holistically.

Data Innovation in 2021: Supply Chain, Ethical AI, Data Pros in High Demand

Year in Review: In year two of the pandemic, enterprise data innovation pros put a focus on supply chain, ethical AI, automation, and more. From the automation to the supply chain to responsible/ethical AI, enterprises made progress in their efforts during 2021, but more work needs to be done.

The Tech Talent Chasm

How a changing world is forcing businesses to rethink everything, and in recruiting IT talent understand that great candidates want their employers to take AI ethics seriously.

3 Components CIOs Need to Create an Ethical AI Framework

CIOs shouldnt wait for an ethical AI framework to be mandatory. Whether buying the technology or building it, they need processes in place to embed ethics into their AI systems, according to PwC.

Why You Should Have an AI & Ethics Board

Guidelines are great -- but they need to be enforced. An ethics board is one way to ensure these principles are woven into product development and uses of internal data, according to the chief data officer of ADP.

How and Why Enterprises Must Tackle Ethical AI

Artificial intelligence is becoming more common in enterprises, but ensuring ethical and responsible AI is not always a priority. Here's how organizations can make sure that they are avoiding bias and protecting the rights of the individual.

Common AI Ethics Mistakes Companies Are Making

More organizations are embracing the concept of responsible AI, but faulty assumptions can impede success.

How IT Pros Can Lead the Fight for Data Ethics

Maintaining ethics means being alert on a continuum for issues. Heres how IT teams can play a pivotal role in protecting data ethics.

Ex-Googler's Ethical AI Startup Models More Inclusive Approach

Backed by big foundations, ethical AI startup DAIR promises a focus on AI directed by and in service of the many rather than controlled just by a few giant tech companies. How do its goals align with your enterprise's own AI ethics program?

The Cost of AI Bias: Lower Revenue, Lost Customers

A survey shows tech leadership's growing concern about AI bias and AI ethics, as negative events impact revenue, customer losses, and more.

What We Can Do About Biased AI

Biased artificial intelligence is a real issue. But how does it occur, what are the ramifications -- and what can we do about it?

How Fighting AI Bias Can Make Fintech Even More Inclusive

Digitized presumptions, encoded by very human creators, can introduce prejudice in new financial technology meant to be more accessible.

Im Not a Cat: The Human Side of Artificial Intelligence

Unconscious biases will be reflected in the data that feeds your AI and ML algorithms. Here are three simple actions to dismantle unconscious bias in AI.

When A Good Machine Learning Model Is So Bad

IT teams must work with managers who oversee data scientists, data engineers, and analysts to develop points of intervention that complement model ensemble techniques.

Visit link:
Quick Study: Artificial Intelligence Ethics and Bias - InformationWeek

Read More..

AI in Construction – How Artificial Intelligence is Paving the Way for Smart Construction – Appinventiv

Artificial Intelligence has definitely made our lives easier in multiple ways. We can access multiple benefits right through our smartphones with the power of digital assistants like Google Assistant, Siri, Alexa, and more.

In todays world, multiple industries such as healthcare, e-commerce, financial services, etc., are leveraging the benefits of AI to the fullest of its potential. The technology has helped businesses grow in leaps and bounds with improved quality, security, and efficiency.

However, it is observed that engineering and construction are lagging behind in implementing artificial intelligence and machine learning solutions. The construction industry is worth more than $10 trillion a year.

Due to the complex challenges that the construction industry faces, the growth in the industry is severely limited. Dealing with challenges like cost and time overruns, labor shortage, health and safety, and productivity can bring revolution in the industry.

The construction industry has tremendous potential, and just by digitization, economically, the worth of the construction industry can be raised to $1.6 trillion a year. AI in construction can be instrumental in bringing this shift.

According to a report, Artificial Intelligence in the construction market is estimated to generate a revenue of $ 2,642.4 million by 2026, at a compound annual growth rate of 26.3% from 2019 to 2026. Technological advancements in AI and the Internet of Things (IoT) will create more opportunities for growth in construction and engineering.

Artificial Intelligence in the construction industry is undergoing a digital transformation. Focussing on technologies like artificial intelligence and machine learning at every stage of engineering and construction, from design to preconstruction to construction to operations and asset management, is exploiting the potential of the construction industry to new levels.

The areas where artificial intelligence in the construction industry is bringing impactful difference by getting the tasks done in a lesser amount of time and in a cost-effective manner.

Planning and designing sub-segment of construction are expected to benefit the most. In the global construction industry, the Europe market is anticipated to top the growth rate.

This technological shift is set to positively impact all the stakeholders across the project including contractors, owners, and service providers. With other adjacent industries such as transportation and manufacturing having already started working as an ecosystem, it becomes all the more important for the construction industry to adapt to the digitization of the processes.

As the technological shift is at a nascent stage in the engineering and construction industry, it will be advantageous for the companies that upgrade the technology. With artificial intelligence in construction, companies can comfortably tackle current issues while avoiding past mistakes.

With the use of statistical techniques of machine learning in construction, it becomes much more convenient and less time-consuming to scrutinize the data pertaining to changed orders, information requests, etc. This will help in proactively alerting the project leaders about the things that need critical attention. Safety monitoring also can be done with more efficiency.

We have established that AI is a critical component of modern engineering and construction approaches. Artificial intelligence in construction helps the industry solve its greatest challenges like cost and schedule overruns and safety issues. AI can be exploited throughout the construction project from inception and design, bidding, financing, transportation management, and operation and asset management.

Let us look in detail at how is AI being used in the construction industry:

AI-based Building Information Modeling (BIM) process has been helping architecture, engineering, and construction professionals make 3D model designs to plan efficiently, design, build, and repair the buildings and infrastructures.

With machine learning in construction, the industry uses AI-powered generative design to identify and collaborate the architecture, engineering, mechanical, electrical, and plumbing plan to ensure that there are no clashes within the sub-teams. Such measures mitigate the risk of rework. The algorithm of ML explores all the options and variations of the solutions to create design alternatives. Models with multiple variations are created and learned from each iteration, and this process is repeated until a perfect model is created.

It is expected that the planning and design sub-segment will grow exponentially with a CAGR of 28.9% between 2019 and 2026.

Construction companies can use AI-powered robots that are equipped with cameras. These robots can move autonomously through the construction site to capture 3D pictures.

With the help of neural networks, these pictures can be cross-checked with reference to the information from BIM and the bill of materials. The engineers managing large projects utilize this information to keep track of the progress of the work. It also helps identify quality errors at an early stage and keep a tap on financial information and time schedules.

It will not be an exaggeration to say that robotics and AI in the construction industry are ensuring the delivery of the best construction projects while saving costs and time.

Construction companies are exploiting the features of the Internet of Things (IoT) to manage the fleets of equipment and vehicles. With the inputs from the AI metrics, IoT provides solutions like location awareness, predictive maintenance capabilities, fuel and battery consumption, and much more.

With IoT devices and tags, it is now possible to predict the equipment breakdown possibility, which is an invaluable tool that saves time and money.

Construction sites are prone to accidents for various reasons. Analyzing and predicting risks with machine learning can avoid many such accidents. Monitoring the sources like photos and videos through the software can flag the potential risk that the site manager can address at the right time.

Reports pertaining to potential safety risks, such as unsafe scaffolding, waterlogging, and personnel missing protective equipment like gloves, helmets, and safety glasses, can be accessed by the user to rank the projects.

As mentioned in the introduction, there exists huge scope for tapping the potential of AI in construction management. There always is a dearth of labor in the construction industry as it involves risks and is a physically demanding job. The average turnover rate in the construction field is way more than in any other industry.

In such a scenario, AI-powered robots empower the project managers to oversee the real-time situation and resource requirements of multiple job sites. Based on the requirements, labor can be shifted to either a different part of the project or a different job site. The robots monitor the site to find the pain areas.

Companies that want to stay ahead in this competitive edge should quickly upgrade their technology. Smart construction can be enabled by incorporating AI. Lets explore how AI in construction is significant.

The current process of construction design is outdated and thus slow. By taking insights from building data, material data, and environmental data, you can optimize your project design.

When done manually, the building process tasks are tedious, time-consuming, and error-prone. The project manager spends most of his time assigning work and managing employee records.

However, Artificial intelligence can automate many such mundane tasks that can be performed with minimal or zero errors. AI automation can additionally take care of task delegation based on the data gathered from the employees. This not only streamlines the workflow process but also encourages workers to focus on their field of expertise.

With camera-enabled robots or AI-enabled construction equipment, data can be collected in different formats. By feeding these details into the deep neural network, the projects progress can automatically be classified from various aspects.

Such data empowers the management to know and address the minutest error or problem in the initial stage mitigating the subsequent major issues.

Employing self-driving construction machines can perform repetitive tasks tirelessly, efficiently, and quickly, such as welding, bricklaying, pouring concrete, etc.

Similarly, you can employ automated or semi-automated bulldozers for excavation and pre-work. Once the exact specifications are fed into these machines, they complete the job exactly as per the specifications. You can free up your human workforce for actual construction work and reduce the human risks involved in performing these tasks.

You can dramatically reduce the time in performing the land surveys in detail and taking aerial photos of the job site for better project management. With the help of drones, Geospatial Information System (GIS) and Geospatial AI (GeoAI) will help you keep track of project progress status and problems on the construction site while leveraging you with better decision making for efficient project management.

With the inception of technology, the construction industry will have cobots and robots working alongside workers. Robots take over the tasks that can be automated, and cobots are designed to work autonomously or with limited guidance.

Such an arrangement will help speed up construction, reduce costs, injuries, and better decision-making. AI in construction will not only overcome the labor shortage issue but will also lead to alterations in business models, and reduce expensive errors, making building operations more efficient. Thus, it is advised that business leaders at construction companies should focus on investment based on areas where AI can have the maximum impact based on needs.

Early adopters of this digital transformation are sure to gain the lead in the business. Getting an edge will make them leaders in setting the direction and reaping short-term and long-term benefits.

The construction industry is lagging behind in technology adoption. Now is the right time to get your processes automated and leverage AI in civil engineering.

Harness the power of automation with Appinventiv and take your construction goals to next level with functionally beautiful building designs.

As an AI development company, our team believes in molding their expertise based on our clients requirements as we have successfully done in the past helping business transformations.

Talk to our experts to tap the full potential of Artificial Intelligence in construction with Appinventive AI and ML development services.

From planning to designing to construction, AI has been spreading its benefits in all the sub-segments of construction. Future of construction with AI will oversee the complete construction project while advising on risk management, schedule adherence, structural integrity, and much more. Harnessing the potential of AI in construction will boost the profits, and reduce the injuries and risks involved.

Sudeep Srivastava

More here:
AI in Construction - How Artificial Intelligence is Paving the Way for Smart Construction - Appinventiv

Read More..

Growth In Artificial Intelligence Is Expected To Drive The Laser Weapon Systems Market At A Rate Of 12% As Per The Business Research Company’s Laser…

LONDON, May 31, 2022 (GLOBE NEWSWIRE) -- According to The Business Research Companys research report on the laser weapon systems market, growth in artificial intelligence is expected to drive the laser weapon systems market in the forecast period. The integration of artificial intelligence is gaining popularity among the laser weapon systems market trends. Artificial intelligence-powered systems are the battlefield's future. They can be deployed quickly and easily without being discovered, and they can wreak havoc with opposing fire. They are undetectable and quite effective. As previously reported by Financial Express Online, the military is expected to begin using artificial intelligence (AI) in the near future in order to become a totally network-centric force. It will take three to four years for the AI technology to be used in the Indian military. The Ministry of Defense has already established a Defense Artificial Intelligence Council with the defense minister as chairman and the three service chiefs, plus the defense secretary and the secretary of defense production, as members. The Defense Research and Development Organization (DRDO) has a specialized laboratory called the Centre for Artificial Intelligence and Robotics (CAIR), which employs about 150 scientists who work on AI Robotics, Control Systems, Command Control Communications and Intelligence (C3I), Networking, and Communications Secrecy. They've developed a robot family for surveillance and reconnaissance purposes. RoboSen is the name for a mobile robot for reconnaissance and surveillance systems. Moreover, the Indian Army during Army Day in 2021 demonstrated a Swarm Attack by drones on multiple targets.

Request for a sample of the global laser weapon systems market report

The global laser weapon systems market size is expected to grow from $4.81 billion in 2021 to $5.39 billion in 2022 at a compound annual growth rate (CAGR) of 11.9%. The growth in the market is mainly due to the companies resuming their operations and adapting to the new normal while recovering from the COVID-19 impact, which had earlier led to restrictive containment measures involving social distancing, remote working, and the closure of commercial activities that resulted in operational challenges. The laser weapon systems industry growth is expected to reach $8.53 billion in 2026 at a CAGR of 12.1%.

North America was the largest region in the laser weapon systems market and was worth $1.64 billion in 2021. The market accounted for 0.006% of the region's GDP. In terms of per capita consumption, the market accounted for $3.3, $2.7 higher than the global average. The growth of the Laser Weapon Systems market in the North American region can be attributed to the growing development of military drones, increased threats of aerial attacks, and increasing investment in military and defense. For instance, the military and defense budget of the USA for 2020 is USD 743.7 billion. Such a high budget will increase the demand to use more advanced products and weapons.

Major players in the laser weapon systems market are Applied Technology Associates, Boeing, Elbit Systems Ltd., General Atomics, BAE Systems, Lockheed Martin Corporation, MBDA, Northrop Grumman Corporation, Raytheon Technologies Corporation, Rheinmetall AG, Thales Group, Kratos, Leidos, Leonardo SpA, and Rafael Advanced Defense Systems.

The global laser weapon systems market is segmented by product into laser designator, LIDAR, 3D laser scanning, laser range finder, ring laser gyro, laser altimeter; by technology into solid state laser, chemical laser, free electron laser, chemical oxygen iodine laser, tactical high energy laser, others; by application into air-based, ground-based, sea-based.

The regions covered in the laser weapon systems market report are Asia-Pacific, Western Europe, Eastern Europe, North America, South America, Middle East, and Africa.

Laser Weapon Systems Global Market Report 2022 Market Size, Trends, And Global Forecast 2022-2026 is one of a series of new reports from The Business Research Company that provide laser weapon systems market overviews, laser weapon systems market analyze and forecast market size and growth for the whole market, laser weapon systems market segments and geographies, laser weapon systems market trends, laser weapon systems market drivers, laser weapon systems market restraints, laser weapon systems market leading competitors revenues, profiles and market shares in over 1,000 industry reports, covering over 2,500 market segments and 60 geographies.

The report also gives in-depth analysis of the impact of COVID-19 on the market. The reports draw on 150,000 datasets, extensive secondary research, and exclusive insights from interviews with industry leaders. A highly experienced and expert team of analysts and modelers provides market analysis and forecasts. The reports identify top countries and segments for opportunities and strategies based on market trends and leading competitors approaches.

Not the market you are looking for? Check out some similar market intelligence reports:

Artificial Intelligence Global Market Report 2022 By Offering (Hardware, Software, Services), By Technology (Machine Learning, Natural Language Processing, Context-Aware Computing, Computer Vision, Others (Image Processing, Speech Recognition)), By End-User Industry (Healthcare, Automotive, Agriculture, Retail, Marketing, Telecommunication, Defense, Aerospace, Media & Entertainment) Market Size, Trends, And Global Forecast 2022-2026

Autonomous Military Weapons Global Market Report 2022 By Type (Autonomous, Semi-Autonomous), By Product (Missiles, Rockets, Guided Bombs, Target Pods), By Platform (Land, Airborne, Naval) Market Size, Trends, And Global Forecast 2022-2026

Defense Support And Auxiliary Equipment Global Market Report 2022 By Type (Military Radars, Military Satellites, Other Defense Support And Auxiliary Equipment), By Payload Type (Communication Payload, Navigation Payload, Imaging Payload), By Application (Intelligence, Surveillance, And Reconnaissance (Isr), Communication, Navigation) Market Size, Trends, And Global Forecast 2022-2026

Interested to know more about The Business Research Company?

The Business Research Company is a market intelligence firm that excels in company, market, and consumer research. Located globally it has specialist consultants in a wide range of industries including manufacturing, healthcare, financial services, chemicals, and technology.

The Worlds Most Comprehensive Database

The Business Research Companys flagship product, Global Market Model, is a market intelligence platform covering various macroeconomic indicators and metrics across 60 geographies and 27 industries. The Global Market Model covers multi-layered datasets which help its users assess supply-demand gaps.

See more here:
Growth In Artificial Intelligence Is Expected To Drive The Laser Weapon Systems Market At A Rate Of 12% As Per The Business Research Company's Laser...

Read More..

How Can Artificial Intelligence Shape The Future Of Photo Editing? | Mint – Mint

By the 1950s, several scientists, philosophers, mathematicians, and others had AI incorporated inside their minds. But human beings have now learned how to transform the concept into reality. In recent times, AI has widespread applications everywhere.

AI has the potential to learn quickly from a significant amount of data. It ensures that some of the most technical issues can be tackled without hassle. But it can also feed your excitement and squeeze out your creativity at work.

AI and Photo Editing

AI has transformed traditional photo editing and made it less time-consuming. It can take your hands off repetitive and manually-intensive tasks. AI understands what we want and helps us achieve it quite easily.

You will come across multiple AI-powered photo editing tools in the market. Each device has its own set of unique features and reduces the workload of photo editing. You can efficiently perform a lot of tasks with a single click. For instance, you can add textures, detect faces, and colorize and sharpen your photos.

You can also improve low-resolution images using AI-powered editing tools. Just imagine you got an excellent click in front of the Eiffel Tower. But a random stranger photobombed without their knowledge. Thanks to AI, you can now find a background remover tool like Slazzer. It is a powerful tool that helps businesses save time and money to make their products stand out against the background.

Removing Unwanted Objects from Your Photos

In the photo editing sector, AI has vast applications. Photo editors use AI-based tools to enhance magazine covers, wedding photos, nature shots, and whatnot. In the future, AI-powered software will be developed to meet specific needs according to the requirements of different forms of photography.

Photo background remover tools like Slazzer have already made life easier for editors. But AI-based photoediting tools will become even better at removing backgrounds. They will be able to detect unwanted elements in a picture and correct the mistakes more accurately.

Researchers have developed AI technology to remove unwanted shadows from photographs. The algorithm can focus on two different types of shadows. Shadows from external objects and the ones due to facial features can be removed.

Professional images are usually taken in a studio with sufficient lighting. But when photos are not taken under ideal conditions, dark shadows might obscure some parts of the subject and accessible highlight other parts. The newly developed AI can address the problem by targeting the undesired highlights and shadows.

It can remove and soften the shadows until the subject is clear. With the background remover tool working in a more realistic and controllable way, it will have a higher value than images captured in casual settings. It is beneficial for fixing images shot under circumstances where the lighting cannot be controlled.

What Does the Future of AI-Based Photo Editing Look Like?

With time, AI will become more useful for editing backgrounds. It will be able to take into account minor details like a persons cloth or hair and add lighting that seems natural.

When you consider popular trends such as NFTs, you will see how we view and acquire art is evolving. New options for selling and packaging digital works are constantly on the rise. AI will play a firm role in their faster arrival at the final product. AI will also provide opportunities to amateurs who wish to try their hands at creating art.

Does AI Mean the Job of Professional Photo Editors Are at Risk?

Its no surprise that the rise of AI concerns specific individuals. In every industry, people are worried that AI will replace human skills. Photographers and photo editors believe that artificially edited images will take their jobs.

But the truth is AI will become a powerful tool for these individuals to improve their performances.

AI is constantly reshaping our workflow. It enables us to move faster without compromising on creativity. We need to embrace these new technologies and integrate them within upcoming software creations. This way, the photo editing industry will be able to become more sophisticated.

Summing up

AI is here to take the photo editing industry to a new level. But theres still a lot of time before machines can replace the need for human skills in the photo editing industry.

Meanwhile, tools like Slazzer, with their ability to remove unwanted objects from a photograph, will make the job easier for editors.

Disclaimer: This article is a paid publication and does not have journalistic/editorial involvement of Hindustan Times. Hindustan Times does not endorse/subscribe to the content(s) of the article/advertisement and/or view(s) expressed herein. Hindustan Times shall not in any manner, be responsible and/or liable in any manner whatsoever for all that is stated in the article and/or also with regard to the view(s), opinion(s), announcement(s), declaration(s), affirmation(s) etc., stated/featured in the same.

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Go here to read the rest:
How Can Artificial Intelligence Shape The Future Of Photo Editing? | Mint - Mint

Read More..