Skip to main content

Quantum Computing Technology Apps Gain Momentum

Research in quantum computing is closely tied to the discipline of information theory, a mathematical concept concerned with communication, coding, and encryption. Various applications of quantum information theory were developed in the last 50 years.

As a result, quantum computing has been high on the research agenda of governments and technology organizations worldwide. In a quantum computing model, the basic unit of information is called the quantum bit (qubit), which can be represented by photons.

Using qubits and quantum gates, the development of a quantum circuit model of computation has been made possible, enabling the use of algorithms to theoretically solve highly complex mathematical problems in a much shorter time frame than is currently possible.

Quantum Computing Market Development

Most experts now agree that the creation of a quantum computer is simply a matter of engineering, and that the theoretical application will happen. Optimistic estimates for commercialization by the private sector vary between 5 and 15 years, while more conservative estimates by academics put it at 15-25 years.

The drive to create the first quantum computer has been viewed as the new arms race. The milestone to reach is that of quantum supremacy, essentially the performance of computation that goes beyond the capability of the latest and best supercomputers in existence today. But this drive is underpinning another, more pressing race: quantum cybersecurity.

ABI Research forecasts that the first attack-capable quantum machines will make their market debut by 2030.  "When they do, even the latest and best in class cybersecurity technologies will be vulnerable," said Michela Menting, research director at ABI Research.

The race to quantum supremacy is real: governmental R&D is accelerating the crystallization of the quantum computer, with more than $1.6 billion already invested globally. The potentially drastic repercussions on cybersecurity is equally real and has led to the focus on quantum-safe cryptography.

Also known as post quantum cryptography, such research looks to the development of new cryptographic algorithms that could withstand breaking by quantum computers, ideally before such computers become commercially available.

Outlook for Quantum Computing Technologies 

Beyond and ahead of quantum computers, the use of the theory has also aided in developing new cryptographic techniques, notably quantum key distribution (QKD). Considered as a type of quantum-safe cryptography, QKD will likely be commercialized before the advent of quantum computers, because it is achievable using current technologies such as lasers and fiber optics. In that sense, QKD is one of the first quantum theories to find real-world applications.

Heavy private sector investment is going into quantum R&D. Since 2012, venture capital funds have pumped over $334 million into companies specializing in the space. Clearly, this is an early-stage market development opportunity with lots of upside growth potential.

Popular posts from this blog

Mobility-as-a-Service Creates Disruptive Travel Options

Building on significant advances in big data, analytics, and the Internet of Things (IoT), more innovative transit service offerings aim to increase public transport ridership and reduce emissions or congestion within metropolitan areas. By providing these services through smartphone apps, the transit services also significantly increase user convenience, providing information on different human mobility offerings -- including public transport, ridesharing, and autonomous vehicles. Mobility-as-a-Service Market Development According to the latest market study by Juniper Research, Mobility-as-a-Service (MaaS) subscribers will generate $53 billion in revenue for MaaS platform providers by 2027 -- that's rising from $5.3 billion in 2021. Let's start with a basic definition. MaaS is the provision of multi-modal end-to-end travel services through single platforms, by which users can determine an optimal route and price. The study identified a monthly subscription model as key to incr

Robocall Mitigation Solutions to Halt Criminal Threats

If you answer the phone and hear a recorded message instead of a live person, it's likely a robocall. A robocall is a phone call that uses a computerized autodialer to deliver a pre-recorded message. In 2020, the U.S. Federal Trade Commission (FTC) received 2.8 million consumer complaints about robocalls. Offering solutions to robocalling and associated fraudulent business practices, computerized mitigation platforms are an integral part of the solution. Platforms that are focused on actionable systems to disrupt unsolicited and potentially criminal phone calls help telecom service providers and industry regulators. Issues of whether one-size-fits-all developments are sufficient to be effective across the spectrum need to be addressed, and whether a single telecom network operator working unilaterally with a third-party platform could compromise desired or mandatory industry-wide standards. Robocall Mitigation Market Development According to the latest worldwide market study by Jun

Why a Distributed Workforce will Raise Productivity

While most senior executives at progressive organizations have already evolved their human resource policies to accommodate employee desire for flexible working models, others still resist change. Unfortunately, many of the laggards are now experiencing the "Great Resignation" phenomenon. The global pandemic required business leaders to rethink when, where, and how their knowledge workers and front-line employees perform their work. Yet even with the ongoing pandemic recovery slowly underway, some organizations are still trying to determine their workforce approach. According to the latest worldwide market study and recent survey data from International Data Corporation (IDC), stability and geography will likely define the balance of future work strategies. Distributed Workforce Market Development On a global basis, physical office sites are expected to be the dominant location for work as legacy organizations eventually find themselves in a more stable environment. However,