Skip to main content

Quantum Computing Technology Apps Gain Momentum

Research in quantum computing is closely tied to the discipline of information theory, a mathematical concept concerned with communication, coding, and encryption. Various applications of quantum information theory were developed in the last 50 years.

As a result, quantum computing has been high on the research agenda of governments and technology organizations worldwide. In a quantum computing model, the basic unit of information is called the quantum bit (qubit), which can be represented by photons.

Using qubits and quantum gates, the development of a quantum circuit model of computation has been made possible, enabling the use of algorithms to theoretically solve highly complex mathematical problems in a much shorter time frame than is currently possible.

Quantum Computing Market Development

Most experts now agree that the creation of a quantum computer is simply a matter of engineering, and that the theoretical application will happen. Optimistic estimates for commercialization by the private sector vary between 5 and 15 years, while more conservative estimates by academics put it at 15-25 years.

The drive to create the first quantum computer has been viewed as the new arms race. The milestone to reach is that of quantum supremacy, essentially the performance of computation that goes beyond the capability of the latest and best supercomputers in existence today. But this drive is underpinning another, more pressing race: quantum cybersecurity.

ABI Research forecasts that the first attack-capable quantum machines will make their market debut by 2030.  "When they do, even the latest and best in class cybersecurity technologies will be vulnerable," said Michela Menting, research director at ABI Research.

The race to quantum supremacy is real: governmental R&D is accelerating the crystallization of the quantum computer, with more than $1.6 billion already invested globally. The potentially drastic repercussions on cybersecurity is equally real and has led to the focus on quantum-safe cryptography.

Also known as post quantum cryptography, such research looks to the development of new cryptographic algorithms that could withstand breaking by quantum computers, ideally before such computers become commercially available.

Outlook for Quantum Computing Technologies 

Beyond and ahead of quantum computers, the use of the theory has also aided in developing new cryptographic techniques, notably quantum key distribution (QKD). Considered as a type of quantum-safe cryptography, QKD will likely be commercialized before the advent of quantum computers, because it is achievable using current technologies such as lasers and fiber optics. In that sense, QKD is one of the first quantum theories to find real-world applications.

Heavy private sector investment is going into quantum R&D. Since 2012, venture capital funds have pumped over $334 million into companies specializing in the space. Clearly, this is an early-stage market development opportunity with lots of upside growth potential.

Popular posts from this blog

IoT Device Management Demand Gains Momentum

More forward-thinking CIOs and CTOs are focused on the adoption of the Internet of Things (IoT). Management challenges are top of mind for those who have already deployed a large number of sensors and associated network edge devices. Device management services are evolving in response to a greater breadth of new device technologies such as edge intelligence and related connectivity solutions, as well as the customer scalability and security of IoT deployments. But forward-looking suppliers are also preparing for a world where 41.3 percent of the connected devices will be using some form of Low Power Wide Area (LPWA) technologies by 2026. IoT Device Management Market Development Since IoT customers increasingly need to manage a larger fleet of connected devices, ABI Research now forecasts that IoT device management services will exceed $36.8 billion in revenues by 2026. Standardization is beginning to play a bigger role in device management services, as more connected devices use LPWA t

Anywhere, Anytime Workplace Demand for SASE

The ongoing adoption of flexible working models within the enterprise market has significant implications for typical IT organizations that must now support knowledge workers and front-line employees that operate outside the corporate network perimeter. The global COVID-19 pandemic created IT networking and security challenges. The expansion of the distributed workforce, an increasing reliance on cloud computing infrastructure, and the requirement to securely connect online employees -- wherever they choose to work, at any given moment in time. Legacy IT solutions that have rigid network underlays and a requirement for on-premises infrastructure cannot adequately deal with these trends. This 'Anywhere, Anytime Workplace' led to demand for new Secure Access Service Edge (SASE) solutions, with networking and security delivered as-a-service. Anywhere, Anytime Workplace Market Development   Although converging networking and security capabilities offer enterprises a promising solut

Cloud Edge Computing Demand Continues to Grow

Public cloud computing solutions are moving closer to the edge of networks where CIOs and CTOs are hosting new apps. The edge journey is well underway for forward-looking organizations as they seek to connect with customers, improve operational efficiency, and adopt digital business technologies to drive innovation. The latest worldwide market study by International Data Corporation (IDC) found that three-quarters of organizations plan to increase their edge computing spending over the next two years with an average increase of 37 percent. A combination of factors is driving this increased spending at the edge. Cloud Edge Computing Market Development The performance requirements of expanding workloads and new use cases that leverage artificial intelligence (AI) and machine learning (ML) demand greater compute capacity at the edge. In addition, the amount of data being stored in edge locations are rapidly expanding, and organizations plan to keep this data longer. As a result, the numbe