Browse Definitions :
Definition

quantum as a service (QaaS)

Quantum as a service (QaaS) is the offering of quantum compute facilities as an on demand service.

The compute capacity of quantum computers exceeds conventional CPUs by many millions of instructions per second (MIPS). This increased capacity is owed mostly to the fundamental nature of quantum computers where their qubits allow them to harness quantum superpositions and Entanglement in order to perform many calculations at the same time. This allows quantum computers to be more effective at trying many solutions to a problem and makes them exceptional at breaking encryption.

Companies such as D-Wave, Rigetti, Microsoft and IBM offer their quantum computers for researchers, allowing those who wish to experiment with quantum computing to develop code without the massive resources to design, build and maintain a quantum computer. The inherent complexity of maintaining reliable operation of quantum computers is due to their highly unstable nature as they require super-cooling and other very controlled conditions to achieve quantum states.

In 2018, quantum computing passed its fledgling stages with Rigetti’s development of a 128 qubit supercomputer. Prior, IBM estimated that universal quantum computers would require 100 qubits, a number thought by some to offer compute capacity beyond all the world’s supercomputers.

Lesser qubit computers are generally offered for use as a service for researchers with access through cloud infrastructure. The simpler quantum computers still present the opportunity to see what quantum computing has to offer and develop and understanding of programing for quantum computing.

This was last updated in November 2018

Continue Reading About quantum as a service (QaaS)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close