Demystifying Quantum Computing: Road Ahead for Commercialization

Demystifying Quantum Computing Road Ahead for Commercialization
In the coming years, quantum computers will likely far exceed the performance of today's supercomputers and as such, will open entirely new opportunities for organizations.The pandemic has underscored the need for CIOs to invest in emerging technologies to both weather this storm and to build a foundation for recovery and future growth. This is evident by tech M&A activity that improved dramatically in the second half of 2020 -- hinting at optimism for the industry, as well as increased and potentially record-breaking levels of movement in the near future. Credit: vchalup via Adobe Stock When it comes to prioritizing such investments, organizations often focus on the core technologies that we frequently hear about: AI, machine learning, 5G, and virtual reality. But there’s another player that has quietly joined the picture with the...

Demystifying Quantum Computing: Road Ahead for Commercialization

Demystifying Quantum Computing Road Ahead for Commercialization
In the coming years, quantum computers will likely far exceed the performance of today's supercomputers and as such, will open entirely new opportunities for organizations.The pandemic has underscored the need for CIOs to invest in emerging technologies to both weather this storm and to build a foundation for recovery and future growth. This is evident by tech M&A activity that improved dramatically in the second half of 2020 -- hinting at optimism for the industry, as well as increased and potentially record-breaking levels of movement in the near future. Credit: vchalup via Adobe Stock When it comes to prioritizing such investments, organizations often focus on the core technologies that we frequently hear about: AI, machine learning, 5G, and virtual reality. But there’s another player that has quietly joined the picture with the...

Industry Perspective: Demystifying Confidential Computing

Industry Perspective Demystifying Confidential Computing
By Bruce Kornfeld In computing, data exists in three states: in transit, at rest and in use. Data moving across the network is “in transit,” data residing in some type of storage is “at rest,” and data being processed is “in use.”  As cyberthreats targeted toward network and storage devices are increasingly thwarted by protections that apply to data in transit and at rest, attackers have shifted their focus to data in use. Common attack vectors include memory scraping, CPU side-channel attacks and malware injection.  Confidential Computing is the protection of data in use, through hardware-based Trusted Execution Environments (TEEs). A TEE is defined as an environment that provides a level of assurance of data integrity, data confidentiality and code integrity.  Security strategists must consider all the different layers of possible...