Page 4,291«..1020..4,2904,2914,2924,293..4,3004,310..»

The top 5 jobs that will prosper from Cloud Computing – OxGadgets (press release) (blog)

Cloud computing is driving thousands of companies to make the shift from traditional methods to the cloud. By definition, cloud computing enables remote machines, accessible via the Internet, to store and process data and applications. Cost-efficient and agile systems are tempting businesses with more efficient methods and the increased cloud job opportunities are the perfect proof of the rapid adoption. It has become big enough to generate quite a few different job types.

Here are 5 jobs that are connected to the cloud:

Cloud architects are the professionals behind the creation and deployment of cloud-based systems. They keep in mind business IT objectives achievable with a scalable and secure system.

Employers generally keep an eye out for prospect candidates with a BS in computer science/engineering as well as experience working with multi-platform networks.

A software engineer for cloud computing designs and develops software to integrate it with the cloud service providers. This position is heavy on programming and software development and familiarity with a compiled language is helpful.

Desired credentials generally include a BS in computer science/engineering and experience in professional software development.

A cloud sales/account executive focuses on closing new business opportunities. A cloud sales/account executive performs in a highly competitive environment and focuses more on translating the tech language into this is what it actually means to you to drive new business and create strategic partnerships.

Employers generally look for a Bachelors degree in business and experience in a client-facing role. Knowledge of the technical part of the cloud is not heavily focused on, but instead, highly effective communication skills are prioritised.

A cloud product managers duty is to focus on product planning. To ensure that offerings are valuable and relevant, a cloud product manager stays on top of strategy, concept, requirement specifications, product positioning and sales processes.

Desired credentials are generally a BS in business or computer experience or extensive experience as a cloud product manager. Experience in a technology company is also sought after.

A cloud analyst performs targeted studies and evaluations to translate them into a cloud strategy. The focus is to understand business outcome objectives and be able to recommend technology options that will map to infrastructure solutions.

Desired credentials include IT consulting experience and extensive knowledge of the cloud space.

Overall, there is a major shift amongst industries as more businesses are shifting over to the cloud. There are many jobs that are being created and the advantages of that go beyond the simple proof of job creation. This means that future technologies can also create jobs, not just take them away by replacing humans. Furthermore, amongst the space, there are numerous cloud-specific companies that people can apply to directly if they are really interested in cloud computing. However, if an individual is interested in working with the cloud but not jumping industries directly, there are now many cloud-specific jobs scattered across all industries. As more and more companies across industries and the globe adopt the cloud, the more cloud-specific jobs open up.

If someone wants to get started in this area, whether for a cloud-specific job or company, then taking some cloud training courses is a great way to boost knowledge and become a cloud expert. There are many online platforms available, such as CloudAcademy, where you can follow general cloud learning paths and even cloud-specific platforms.

The cloud is certainly here to stay, so everyone has a choice regarding how and where to get involved. These five jobs show the availability of technical jobs, product management and sales jobs. Similar to any other industry, the IT industry has a mix of job offerings that will prosper from cloud computing.

Like Loading...

Sami Mughal

Can be found somewhere between designing new tech as an electronics engineer or testing new tech as a technology enthusiast. Lives mostly on Twitter, and would love to have a word with you there as @smacula.

View post:
The top 5 jobs that will prosper from Cloud Computing - OxGadgets (press release) (blog)

Read More..

Integrating cloud and on-premises workflows – ZDNet

Integration stands out as the top challenge for companies that have embraced SaaS and the cloud. We'll deliver expert considerations and tips for IT implementers who need to connect hosted apps and services to the corporate infrastructure.

In the age of the cloud, users expect complete abstraction between themselves and the underlying platforms that are supporting their work. All applications, whether delivered as Software-as-a-Service (SaaS), or hosted from a co-location facility, or even from on-premises, must be available constantly. This has to be the guiding principle for IT professionals who are supporting on-prem workflows with cloud services.

Look for cloud providers who are happy to cooperate with your operation. Some will welcome the opportunity and support your integration efforts. Some will even offer APIs and other integration tools to ease the process. It is worthwhile to examine how Microsoft in particular has addressed the multi-platform issue at two very specific levels.

Cloud as data center extension

According to a Microsoft Azure website post from November 2, 2014 defining Azure Active Directory:

"Azure Active Directory is a service that provides identity and access management capabilities in the cloud. In much the same way that Active Directory is a service made available to customers through the Windows Server operating system for on-premises identity management, Azure Active Directory (Azure AD) is a service that is made available through Azure for cloud-based identity management."

"Azure AD can be used as a standalone cloud directory for your organization, but you can also integrate existing on-premise Active Directory with Azure AD. Some of the features of integration include directory sync and single sign-on, which further extend the reach of your existing on-premises identities into the cloud for an improved admin and end user experience."

Since then, many companies have ceased investing in additional servers and storage, preferring instead to simply use Microsoft Azure for seasonally elevated needs, special projects, or promotions that drive significantly increased traffic. All you have to do is unify your Active Directory between Windows Server on premises and Azure subscribed servers, then provision resources instantly from a self-service console.

For users, the connection between local and cloud resources is completely transparent. For corporate IT departments, management of resources on both sides of the connection is seamlessly blended into one Active Directory console. Over time, you can retire on-premises servers and replace them with additional Azure servers. Not to mention apps like Office 365 and SharePoint. This kind of relationship represents a simpler, faster, less expensive, less burdensome path to data center expansion that scales effortlessly.

Integrating individuals and information

The introduction of Microsoft Teams provides a meaningful answer to those users who found it difficult to integrate their work with their communications, making collaboration less robust.

Since Microsoft Teams is "chat-based," users can discuss issues with other team members, referring to information and content that is surfaced along with the chat. Microsoft Teams brings together the full breadth and depth of Office 365 to provide a true hub for teamwork. Word, Excel, PowerPoint, SharePoint, OneNote, Planner, Power BI and Delve are all built into Microsoft Teams, as well.

Microsoft Teams is also built on Office 365 Groups--the cross-application membership service that makes it easy for people to move naturally from one collaboration tool to another, preserve their sense of context, and share with others.

Microsoft Teams integrates individuals and their information with a truly intuitive, interactive, transparent interface. You can find out more about how Office 365's collaboration tools help keep management connected to mobile field workers here. http://www.zdnet.com/article/cloud-strategies-mobility-collaboration-at-g-j-pepsi-cola-bottlers/

Read more:
Integrating cloud and on-premises workflows - ZDNet

Read More..

WannaCry is a wake up call for cloud migration – ITProPortal

On May 12th 2017, cyber criminals launched what is believed to be the biggest ransomware attack ever recorded. This ransomware outbreak, dubbed WannaCry, spread with unprecedented speed, taking down the systems of more than 100,000 organisations in over 100 countriesall within a span of 48 hours.

Although the magnitude of this attack surpasses all others of its nature, beneath its success and that of its counterparts lies the same prevailing issues: unmanaged risk and pending vulnerabilities. In this particular case, the vulnerability in question is widely thought to have been attributed to unpatched Microsoft systems.

There is also a wider issue. As systems often reside within a business silo or line of business, responsible stakeholders are regularly not IT nor security experts, but rather those focused on their individual business targets. If these silos were to host these systems virtually in the cloud, organisations could then ensure that their mission critical operations are always in the hands of experts. Theres a solid chance that this move can prevent future breaches on the scale of WannaCry.

The danger of unpatched, outdated systems

This latest ransomware onslaught is a resounding reminder of the importance of security basics, especially when it comes to Microsoft product patching. Security professionals have long stressed the importance of basic security hygiene, such as patching and backups. However with the pace of change and the demands of agility in todays environment, that advice can often be deprioritized by complacency, when security updates are perceived as both an inconvenience and an additional overhead for the business.

For example, a flaw in a file sharing protocol of the Microsoft Windows Operating System was fundamental in its contribution to the scale of this attack, and this could have been very easily avoided. Those who applied critical Microsoft Windows patches released in March were protected against this exploit. Those who didnt were left at risk.

The sheer scale of this attack shines a light on just how many organisations have outdated, unpatched systems and acts as a wake-up call to business and IT professionals to mitigate against future instances. Arguably, the impact of WannaCry could have been significantly reduced had critical Microsoft Windows patches been applied in time throughout organizational networks. This draws us back to a poignant reminder that with systems managed in the cloud, patches and updates are often applied automatically following extensive testing, thereby removing this potential vulnerability.

Safety in numbers

Beyond automatic patching, hosting systems in the cloud also provides exponential scale in terms of monitoring and threat detection. Through continuous, centralised monitoring in the cloud, security incidents are quickly detected and managed. Providing this level of security at the outset and on a proactive basis as opposed to reactively means that any issues or intrusions detected are given immediate attention by the right experts, who can take action for every potential piece of data exposure, whether pertaining to individual customer or organisational data. This extends to malware prevention, including ransomware such as WannaCry.

The depth of data available is key here. IBM for example has the largest database of known security threats, with 8,000 security experts monitoring more than 270 million monitored endpoints and 20 billion incidents daily in 133 countries. Conversely, many businesses are working in the dark, not even aware they have been breached until it is too late and the damage has already been done. By using a managed cloud provider that has security expertise and access to all of the latest data, brands can ensure that any kind of incident will be managed, immediately, by a dedicated incident manager.

Backup to stay up

Maintaining full visibility of data residency as well as ensuring regular data back-up routines are two practices, which are critical to sound security hygiene. These back-ups must be secure as opposed to constantly connected or mapped to the live network. They must also be tested periodically to verify their integrity and value in case of emergency.

Whether organisations have chosen an on-premise, off-premise or hybrid solution, vendors must ensure timely, secure back-ups and disaster recovery. Businesses may even opt to back up their data across data centres in different regions, ensuring that if one region is affected there is still continuity. Through perimeter security in a hybrid solution, businesses can also ensure that an issue or incident will not be transferred from public to private environments.

Beware of weak links

Finally, it is well known in the industry that one of the most volatile security vulnerabilities in an organisation is its people. Identity and access management (i.e. the knowledge of who has access to what, and where) is therefore absolutely crucial. Cloud identity management, often now known as Identity as a Service, is a practice businesses must employ to maintain complete control over this, minimising the insider threat and ensuring that there are no weak links in the chain.

That being said, humans are not the only weak link. Hardware can also prove to be vulnerable. This trend is beginning to shift with the advent of bare metal cloud servers, allowing businesses to have confidence that security is baked in at microchip level. With hardware monitoring and security controls, businesses can be assured that workloads are only being run on trusted hardware. This provides an essential level of confidence and compliance certification.

Prepare for the inevitable

Ultimately, brands cannot afford to be complacent when it comes to security, especially as GDPR enforcement coming next year brings with it the prospect of hefty fines in the cases of data breaches and data accountability. Surveys show that for some brands, these fines hold the potential to shut down operations altogether. Although unique in scale, security incidents are a growing force and WannaCry wont be the last global attack we see. In fact, these incidents hold the potential to become even more frequent and devastating in their impact as our economy and workforce become more reliant on digital means. Many businesses do not have the capacity or expertise to take full responsibility for their data security. In many cases, a more effective cloud strategy will place organisations in a stronger position to mitigate against the potential to fall victim to the next generation of WannaCry campaigns.

Helen Kelisky, VP Cloud UKI, IBM

Image Credit: Carlos Amarillo / Shutterstock

See the article here:
WannaCry is a wake up call for cloud migration - ITProPortal

Read More..

Three benefits powering the cloud hype – The Media Temple Blog (press release) (blog)

Cloud computings roots go back to the start of the computer age, when the shared access mainframes of the 70s and 80s laid its foundation. Less than a decade later, virtual machines (VMs) and virtual private servers (VPS) created new efficiencies in sharing hardware resources. Powered by a single piece of hardware, not only was it expensive to maintain the infrastructure but any outage or malfunction also spelled disaster for sites or apps.

Butwhat exactly is fueling the current cloud hype and, critically, why now?

Where previous iterations required all of the various software components to live in one physical space, the modern cloud distributes software pieces across multiple services that are optimized for their specific use. This has a twofold effect: Not only does it improves the overall performance of your cloud setup, but it also creates redundancies that significantly improve an organizations agility and the uptime of digital assets.

The cloud can receive software updates instantly, providing a near instant modernization of any existing infrastructure. This allows enterprises to realize cutting-edge scalability, connectivity, cost savings, and security benefits. By being able to update resources or software instantly, it can mean the difference between dreading spikes in web traffic and welcoming them. It provides the peace of mind that sites and apps will not be outdated and thus fall victim to security breaches or brought down under the weight of a DDos attack.

Hosting high-traffic sites and apps on todays cloud allows enterprises to only pay for what they use. Rather than getting bogged down by significant upfront costs for possibly unused hardware and infrastructure, current cloud models utilize a pay-as-you-go structure. Enterprises can provision additional capabilities as needed, making it easy to accommodate for a campaign launch or a special event like an online sale. When that has ended, its simple to scale back during periods of regular traffic to cut costs and save resources.

Advances in technology have finally made the overall speed, security, and reliability of cloud computing meet the needs of modern organizations on the internet. Now, users can unlock the clouds unique advantages without sacrificing performance or putting unnecessary pressure on their IT budgets. Learn more here.

Read more from the original source:
Three benefits powering the cloud hype - The Media Temple Blog (press release) (blog)

Read More..

Quantum Computers Will Analyze Every Financial Model at Once – Singularity Hub

In the movie Office Space, Peter Gibbons has a stroke of genius. Confronted with the utter mundanity of a life slaving away at his office park software company, he convinces his friends to make a computer virus to skim a fraction of a cent off transactions into a shared bank account.

This, of course, goes horribly wrong. But the concept is actually pretty solid.

In the real world, where there are literally billions of transactions crisscrossing the globe every day, you can make a big profit buying and selling securities whose prices barely differ.

But heres the key. You have to be fast. Inhumanly so. Enter physics and computers.

Computerized high-frequency trading was born from a collision of rapidly growing computing power and an influx of math and physics PhDs into finance. These wonks worked out complex quantitative buy-sell strategies, built them into algorithms, and set their software loose.

While the practice is nothing if not controversialand there are quantitative strategies that work over longer time frames tooits impact on the market is undeniable. In any given year, high-frequency trading is responsible for up to half or more of all trades. And of course, notoriously, such algorithmic trading was also involved in 2010s infamous Flash Crash.

But all this is only the beginning of how physics and computers can flip finance upside down.

At Singularity Universitys Exponential Finance Summit this week, Andrew Fursman said quantum computers, which harness natures most basic laws, are coming sooner than you think. And while digital computing was an evolution, quantum computing will be a revolution.

Fursman is CEO and cofounder of 1Qbit, a quantum computing software startup focused on making quantum computing applications practical for industry.

Quantum computing, he said, is just in its earliest stages, more akin to the hulking special-purpose computers of the 40s and 50s instead of the sleeker personal digital machines of recent decades. But he thinks its about to get practical, and itll pay dividends to those paying attention.

In finance, computing power is really a bit of an arms race, Fursman said. And as you all know, in many of these situations, it's winner takes all.

The next revolution has been a long time coming. It began with physicist Richard Feynman.

When modern digital computers were just gaining momentum, Feynman looked far down the roadhe was a genius theorist after alland noted the most powerful computers would not be digital, theyd be quantum. That is, theyd harness the laws of nature to compute.

Its counterintuitive to think of the world as a computer, said Fursman, but its an instructive analogy if you want to grasp the speed and simultaneity of quantum computers.

Complexity is nothing to nature. Just imagine how quickly and effortlessly glass breaks, he said.

In far less time than it takes to blink your eye, the laws of nature instruct the atoms in the glass to fracture into a massively complex spider web. Not unlike a computer, the laws of physics are the underlying logic allowing the glass to compute its complex demise in an instant.

Quantum computers similarly harness natures power to compute. Instead of using 1s and 0s to calculate things, they use the rules of quantum mechanics to compute with 1s, 0s, and both simultaneously. This means they can rapidly solve massively complex problems.

[Go here to learn more about how quantum computers work.]

But todays machines, like D-Waves adiabatic quantum computers, arent like your laptop, which is whats called a universal computer due to its ability to do many tasks. Instead, quantum computers today are specialized, complicated, difficult to program, and expensive.

Fursman thinks well get universal quantum computers in future, but well before then, in something like three to five years, he thinks early quantum computers will get practical. And because they can do things no other computer can, theyll be powerful.

In finance, its often about optimization. And todays quantum machines excel at optimization.

Consider building a portfolio out of all the stocks in the S&P 500, Fursman said. Given expected risk and return at various points in time, your choice is to include a stock, or not. The sheer number of possible portfolio combinations over time is mindboggling.

In fact, the possibilities dwarf the number of atoms in the observable universe.

To date, portfolio theory has necessarily cut corners and depended on approximations. But what if you could, in fact, get precise? Quantum computers will be able to solve problems like this in a finite amount of time, whereas traditional computers would take pretty much forever.

The work is already underway to make this possible.

Fursman noted a paper written by Gili Rosenberg, Poya Haghnegahdar, Phil Goddard, Peter Carr, Kesheng Wu, and Marcos Lpez de Prado in which they outline a new way to solve for an optimal portfolio. Instead of finding the best portfolio at discrete times in the future, they outline a way to find the best portfolio overall through time. Such a portfolio would reduce the transaction costs of rebalancing portfolios and potentially save the industry billions.

To be clear, this isnt ready for prime time yet. But Fursman thinks it will be shortly. The key? Their proposed portfolio optimization method is compatible with existing quantum computers. Specifically, they looked at D-Waves adiabatic machines, and according to the paper, they believe it can scale up in complexity as the underlying technology improves.

It's something that has real ability to impact what's possible within your industry and to make money doing all the things you already dobut in completely new ways, Fursman said.

Exponential Finance, according to Fursman, is a bit ahead of the curve. The event has focused on the possibility of quantum computing in finance for the last several years.

But now, its poised to make an impact. Google recently announced they expect to achieve quantum supremacy by the end of this year. That means theyll have shown a quantum computer capable of solving a problem no conventional computer can.

Fursman thinks the slowing of Moores Law may be lulling some into complacency. Whereas at one point you could barely keep pace, even if you bought a new computer every year; these days, the computer you bought four years ago is basically stillable run whatever you want today.

But for businesses, the pace of progress is about to speed up again.

The quantum computing industry [today] is just [the] spark. Its just the very, very beginning of whats going to be possible, Fursman said. Those sparks are going to turn into a huge explosion, and all of a sudden, youre going to be faced with incredible amounts of computing capabilities that directly tackle the types of problems most relevant to what youre doing.

This isnt going to take 20 years, he said, or even ten years. Itll be here in three to five years. So, now is the time to start thinking about what quantum will do for you.

Image Credit: Shutterstock

Excerpt from:
Quantum Computers Will Analyze Every Financial Model at Once - Singularity Hub

Read More..

From the Abacus to Supercomputers to Quantum Computers – Duke Today

If using quantum mechanics to compute problems that are unsolvable with todays fastest supercomputers sounds outrageously ambitious, thats because it is. There are many experts who say that it cant be done.

But thats not stopping Jungsang Kim, professor of electrical and computer engineering at Duke University, from pursuing the impossible. A pioneer in translating theoretical quantum physics into physical hardware, Kim has been engineering the components for a quantum computer at Duke for more than a decade.

And hes starting to sniff the finish line.

Weve put together and demonstrated all of the individual components needed to build a large, scalable quantum computer, said Kim. We are convinced that within the next few years we could turn this technology into much more sophisticated quantum computers with the potential to solve problems considered impossible today.

Imagine a computer trying to put together a jigsaw puzzle. Because computer code is binary, either a piece fits or it doesnt, the most efficient method would be to pick a piece at random and attempt to attach every other available piece until one fits. Todays computers would then take that two-piece unit, and repeat the entire process over and over until the puzzle is completed.

Even with todays supercomputers, this process would take a long time because it must be done sequentially. Quantum computers, however, have the advantage of occupying many different states at the same time.

Now imagine a quantum computer with enough qubitsindividual pieces of memory analogous to todays transistorsto assign one to each puzzle piece. Thanks to quantum mechanics, all possible configurations are stored into a quantum memory, which is manipulated in a very careful way so that all the non-answers fade away very quickly and all the real answers emerge in a systematic way. This allows the quantum computer to converge on a solution much more efficiently than a classical computer.

Nobel Laureate Bill Phillips said that using quantum principles to compute is as different from classical computing as a classical supercomputer is from an abacus, said Kim. There are, however, several different ways that one might achieve this. Our group has focused on approaches using individually trapped ions.

The qubits in Kims quantum computer are individually trapped ionsatoms with electrons stripped away to give it a positive electric charge. That charge allows researchers to suspend the atoms using an electromagnetic field in an ultra-high vacuum. Kim and his colleagues then use precise lasers to manipulate their quantum states.

The method is promising. Kim and colleague Christopher Monroe at the University of Maryland have secured more than $60 million in grants to transition these ideas into large, scalable quantum computers. And theyre not alonemany other big companies like Google, IBM, Microsoft and Intel are starting to make big investments as well.

With the potential to revolutionize industries such as materials design, pharmaceutical discovery and security encryption, the race is on. And Kim and his colleagues are the only ones betting on trapped ions, having started a company called IonQ to pursue commercialization of the technology.

Our collaboration actually has a small qubit quantum computer that's very generally programmable, said Kim. We think we know how to take this system and turn it into a much bigger system that is reliable, stable and much more scalable. We've come to a point where we believe that even commercially viable systems can be put together.

Visit link:
From the Abacus to Supercomputers to Quantum Computers - Duke Today

Read More..

Microsoft and Purdue work on scalable topological quantum computer – Next Big Future

In 2016, Purdue University and Microsoft have signed a five-year agreement to develop a useable quantum computer. Purdue is one of four international universities in the collaboration. Michael Manfra, Purdue Universitys Bill and Dee OBrien Chair Professor of Physics and Astronomy, professor of materials engineering and professor of electrical and computer engineering, will lead the effort at Purdue to build a robust and scalable quantum computer by producing what scientists call a topological qubit.

The team assembled by Microsoft will work on a type of quantum computer that is expected to be especially robust against interference from its surroundings, a situation known in quantum computing as decoherence. The scalable topological quantum computer is theoretically more stable and less error-prone.

One of the challenges in quantum computing is that the qubits interact with their environment and lose their quantum information before computations can be completed, Manfra says. Topological quantum computing utilizes qubits that store information non-locally and the outside noise sources have less effect on the qubit, so we expect it to be more robust.

Purdue University and Microsoft Corp. have signed a five-year agreement to develop a useable quantum computer. Purdue is one of four international universities in the collaboration. Michael Manfra, Purdue Universitys Bill and Dee OBrien Chair Professor of Physics and Astronomy, Professor of Materials Engineering and Professor of Electrical and Computer Engineering, will lead the effort at Purdue to build a robust and scalable quantum computer by producing what scientists call a topological qubit. (Purdue University photo/Rebecca Wilcox)

Arxiv Topological Quantum Computation

The theory of quantum computation can be constructed from the abstract study of anyonic systems. In mathematical terms, these are unitary topological modular functors. They underlie the Jones polynomial and arise in Witten-Chern-Simons theory. The braiding and fusion of anyonic excitations in quantum Hall electron liquids and 2D-magnets are modeled by modular functors, opening a new possibility for the realization of quantum computers. The chief advantage of anyonic computation would be physical error correction: An error rate scaling like e, where is a length scale, and is some positive constant. In contrast, the presumptive qubit-model of quantum computation, which repairs errors combinatorically, requires a fantastically low initial error rate (about 10^4) before computation can be stabilized.

Manfra says that the most exciting challenge associated with building a topological quantum computer is that the Microsoft team must simultaneously solve problems of material science, condensed matter physics, electrical engineering and computer architecture.

This is why Microsoft has assembled such a diverse set of talented people to tackle this large-scale problem, Manfra says. No one person or group can be expert in all aspects.

Purdue and Microsoft entered into an agreement in April 2016 that extends their collaboration on quantum computing research, effectively establishing Station Q Purdue, one of the Station Q experimental research sites that work closely with two Station Q theory sites.

Purdues role in the project will be to grow and study ultra-pure semiconductors and hybrid systems of semiconductors and superconductors that may form the physical platform upon which a quantum computer is built. Manfras group has expertise in a technique called molecular beam epitaxy, and this technique will be used to build low dimensional electron systems that form the basis for quantum bits, or qubits.

The work at Purdue will be done in the Birck Nanotechnology Center in the universitys Discovery Park, and well as in the Department of Physics and Astronomy. The Birck facility houses the multi-chamber molecular beam epitaxy system, in which three fabrication chambers are connected under ultra-high vacuum. It also contains clean-room fabrication, and necessary materials characterization tools.

Follow this link:
Microsoft and Purdue work on scalable topological quantum computer - Next Big Future

Read More..

Scientists May Have Found a Way to Combat Quantum Computer Blockchain Hacking – Futurism

In Brief While quantum computers could improve the world by decreasing processing times, they could also be the ideal tool for hackers, which is a true threat to the success of blockchain. Russian scientists, though, may have found the solution. Russias Solution to Quantum Hacking

A serious concern in the computing industry is that when true quantum computers are produced, the principles of encryption will break down due to the dizzyingly superior processing power.

Although blockchain is a far more secure method of transaction than our current financial system, even it will become vulnerable to a brute force attack by a quantum computer. Andersen Cheng, co-founder of U.K. cybersecurity firm Post Quantum, told Newsweek, Bitcoin will expire the very day the first quantum computer appears.

A team lead by Evgeny Kiktenko at the Russian Quantum Center in Moscow, though, may have found a way to protect blockchains by fighting fire with fire using quantum mechanics. They are designing a quantum-secured blockchain where each block, hypothetically, is signed by a quantum key rather than a digital one.

They propose that transmitting and encrypting information using quantum particles such as photons, which cannot be copied or meddled with without the particles being destroyed, ensures the blockchains safety. The principle is based on Zero-knowledge proofs which allow you to validate information without sharing it.

In recent months Russia has become increasingly interested in blockchain. The central bank is composing new laws focused on cryptocurrencies and is interested in developing one of its own. This research marks a step forward in these efforts because it concerns the protection of such systems.

If the quantum-secured blockchain proves successful it would be hugely beneficial to the rest of the world as well. Blockchain has the potential to do a lot of good for the world by streamlining the transaction system, making it more secure, and ensuring transparency like never before. Countries such as Senegal have developed currencies that are entirely digital, Japan is accepting bitcoin (which uses blockchain) as legal tender in 260,000 stores this summer, and Ukraine is considering using it to combat corruption.

If the advent of quantum computing could be the apocalypse for blockchain, it is therefore crucially important that we begin thinking about how to protect these system before entire countries and currencies could be subject to hacks from the abusers of quantum computers.

Read more:
Scientists May Have Found a Way to Combat Quantum Computer Blockchain Hacking - Futurism

Read More..

Are Enterprises Ready to Take a Quantum Leap? – IT Business Edge

The exciting landscape of modern life has been built with the aid of powerful computers. They have done dazzling things, from making the trains run on time to helping to build skyscrapers. Now, imagine a discontinuity in computing in which these capabilities are suddenly expanded and enhanced by orders of magnitude.

You wont have to imagine too much longer. It is in the process of happening. The fascinating thing is that this change is based on quantum science, which is completely counter-intuitive and not fully understood, even by those who are harnessing it.

Todays computers are binary, meaning that they are based on bits that represent either a 1 or a 0. As fast as they go, this is a basic, physical gating factor that limits how much work they can do in a given amount of time. The next wave of computers uses quantum bits called qubits that can simultaneously represent a 1 and a 0. This root of the mysteries that even scientists refer to as quantum weirdness allows the computers to do computations in parallel instead of sequentially. Not surprisingly, this greatly expands the ability of this class of computers.

The details of how quantum computers operate are more or less impossible to understand. A couple of related points are clear, however: Harnessing the power of quantum mechanics to create incredibly powerful machines is not a pipe dream: Companies such as IBM, Microsoft and Google, as well as startups and universities, dont sink billions of dollars in flights of fancy.

The second point is that the payoff is here, or at least quite near. The world of computing wont instantaneously change once quantum actions are proven. It is still a long road to being fully commercialized, bypassing classical approaches and, finally, living up to the most extravagant promise.

In late May, Microsoft and Purdue University announced research on quantum computing that focuses on one of the key challenges, which is the extraordinarily fragile nature of the qubits. Indeed, the subject of the research is a good example of the amazing complexity of the field and how far it has to go.

In quantum mechanics, the mere act of looking at the system makes it choose between the 1 and the 0 and exit the quantum state. The task of the Microsoft/Purdue research is to develop topological qubits that are stable enough to function in the real world.

In essence, according to Professor Michael Manfra, the university's Bill and Dee O'Brien Chair Professor of Physics and Astronomy, stability increases as the quantum properties are spread out.

The quantum variable that houses information is really a property of the quantum system as [a] whole, he wrote to IT Business Edge in response to emailed questions. More particles may be needed to define the qubit, but this complexity has an advantage while a local disturbance or perturbation can flip an individual spin, it is much less likely to change the state of the entire quantum system that comprises a topological qubit.Therefore these topological qubits are expected to be more robust.They do not couple well to the commonly occurring noise in the environment.

Preparing for the Quantum Future

There is an angle to all of this that is refreshingly straightforward and accessible, however: Great change is coming and companies need to prepare for quantum computing. Indeed, even assuming that the high-profile changes are down the road a bit, they will be massive when they do arrive.

The bottom line is that planners need to think about quantum computing. A logical first step in assessing the impact is identifying the tasks it will most likely perform. In responses to emailed questions, Jerry Chow, the manager of Experimental Quantum Computing for IBM, told IT Business Edge that four areas likely to be affected are business optimization (in areas such as the supply chain, logistics, modeling financial data and risk analysis); materials and chemistry; artificial intelligence and cloud security.

Things may not be quite as clear cut, however. David Schatsky, the managing director of Deloitte LLP, told IT Business Edge, in response to emailed questions, that risk management, investment portfolio design, trading strategies, and the design of transportation and communications networks will be affected. Quantum computer, he wrote, could be disruptive in cryptography, drug design, energy, nano-engineering and research.

Thats an almost intimidating list. However, Schatsky prefaced it with a disclaimer: Quantum computing will entirely transform some kinds of work and have negligible impact on others. The truth is, researchers dont yet know all the types of problems quantum computing may be good for.

There Is Still Time to Prepare

Luckily, planners have time. Quantum computing will be a massive change, but one that will be gradual. It makes sense to think of quantum computing as a new segment of the supercomputer market, which is a small fraction of overall IT spending, Schatsky wrote. Annual supercomputer server sales total about $11 billion globally by some estimates. I suspect quantum computing revenues will be a very small fraction of that for years to come. So Im not sure its going to become common anytime soon.

Though it clearly will be quite a while before people are buying quantum computers on Amazon, organizations need to be thinking about quantum computing today. The power of quantum computing is so extreme, especially when coupled with artificial intelligence and other emerging techniques, it is clear that all of that time must be put to good use.

IBMs Chow said that quantum-driven platforms such as Watson will be able to find patterns that are buried too deeply for classical computers. This will open new frontiers for discovery, he wrote.

It is a new age, not a new computer.

Corporations should ask: How do I learn about quantum computing to get a feel for where it might make a difference? Now is the time to realize its enormous potential, and that this is a field ripe for innovation and exploration that goes beyond simply just an end application. Becoming quantum-ready is about participating in a revolution within computing. People need to learn the details enough to open their minds up about what could be possible.

And, eventually, quantum mechanics may go beyond computing.

In general terms, I believe the development of quantum technologies is inevitable quantum computing is perhaps just the most visible example, Manfra wrote. It is not hard to imagine that certain businesses in which innovation may be enhanced by dramatic improvement in computational capabilities will need to have long-term plans which exploit quantum machines once they become available.

Carl Weinschenk covers telecom for IT Business Edge. He writes about wireless technology, disaster recovery/business continuity, cellular services, the Internet of Things, machine-to-machine communications and other emerging technologies and platforms. He also covers net neutrality and related regulatory issues. Weinschenk has written about the phone companies, cable operators and related companies for decades and is senior editor of Broadband Technology Report. He can be reached at cweinsch@optonline.net and via twitter at @DailyMusicBrk.

Read more here:
Are Enterprises Ready to Take a Quantum Leap? - IT Business Edge

Read More..

Every day is Internet Security Day | News, Sports, Jobs – Marshall … – Marshall Independent

Being safe online is important every day. There may be days devoted to internet security awareness, but you need to be careful every time you go online.

Do you know what it takes to be safe online? You probably connect daily to get information, shop, socialize, or work. Every time you go online, you need to avoid the risk of theft or fraud. Here are some tips to use while visiting the Social Security website and the other websites you use.

Use strong passwords Strong passwords have at least eight characters and include capital letters, numbers and non-letter characters. These passwords make it harder for someone to hack your account.

Dont recycle passwords Although it requires effort to think of new passwords constantly, it provides safety when you do. What if you use the same password for every site and you lose your password? If someone finds it, they could get access to all your accounts. Many people choose to reuse dont be one of them.

Take advantage of multifactor authentication Many websites offer the option to use a second factor or method in addition to just a username and password to ensure that only you access your information. Using more than one factor to establish identity makes it harder for someone to get into your account and steal your personal information. Beginning June 10, Social Security requires multifactor authentication to access a my Social Security account. Customers choose whether to receive a one-time security code to either their phone or email in order create a new account or sign into their account. Visit this link to find out more about how to secure your personal my Social Security account: http://www.socialsecurity.gov/myaccount/verifyandprotectid.html. Consider using multifactor authentication whenever its offered to protect your information.

Read scam alerts For information about fraudulent activities related to Social Security, you can find information at our blog Social Security Matters under the Newsroom section at blog.socialsecurity.gov. One way to avoid identity theft is to create your own my Social Security account, if you havent already. When you have an account, no one else can set up an account using your information. Social Securitys Office of the Inspector General investigates fraud involving Social Security and they publish Fraud Advisories at oig.ssa.gov/newsroom/news-release. The Federal Trade Commission website publishes information about scams that appear in the news at http://www.consumer.ftc.gov/scam-alerts. Youll want to be aware of current scams to avoid being tricked.

Review your online accounts and credit reports Just as you review your earnings record with Social Security for accuracy at http://www.socialsecurity.gov/myaccount, you should review your bank and credit card accounts for accuracy. Get a free copy of your credit report available annually from the three credit reporting agencies (Experian, Equifax, and Transunion) at http://www.annualcreditreport.com/ and check it for incorrect entries.

Protecting your identity can be daunting. Guarding your personal information requires investing some time, but is worth it. Discourage theft and fraud by adopting these security practices when you use the Internet.

By the end of the 19th century, especially in the upper and middle class, the wedding dowry and/or hope chest took ...

Most of us probably remember this phrase from Shakespeares Julius Caesar from our high school English ...

The Marshall Community Services summer Talents Academy focuses on creative and educational classes for kids in ...

A few months ago, Ted Kooser (poet laureate of the United States 2004-2006) chose a poem by Tim Nolan to print for ...

Last month in Starwatch I told you about the zodiac band that runs through the night sky. Because the Earth and the ...

Read this article:
Every day is Internet Security Day | News, Sports, Jobs - Marshall ... - Marshall Independent

Read More..