Browse Definitions :
Definition

quantum computer

A quantum computer is a machine, as-yet hypothetical, that performs calculations based on the behavior of particles at the sub-atomic level. Such a computer will be, if it is ever developed, capable of executing far more millions of instructions per second (MIPS) than any previous computer. Such an exponential advance in processing capability would be due to the fact that the data units in a quantum computer, unlike those in a binary computer, can exist in more than one state at a time. In a sense, the machine "thinks" several "thoughts" simultaneously, each "thought" being independent of the others even though they all arise from the same set of particles.

Engineers have coined the term qubit (pronounced KYEW-bit) to denote the fundamental data unit in a quantum computer. A qubit is essentially a bit (binary digit) that can take on several, or many, values simultaneously. The theory behind this is as bizarre as the theory of quantum mechanics, in which individual particles appear to exist in multiple locations. One way to think of how a qubit can exist in multiple states is to imagine it as having two or more aspects or dimensions, each of which can be high (logic 1) or low (logic 0). Thus if a qubit has two aspects, it can have four simultaneous, independent states (00, 01, 10, and 11); if it has three aspects, there are eight possible states, binary 000 through 111, and so on.

Quantum computers might prove especially useful in the following applications:

  • Breaking ciphers
  • Statistical analysis
  • Factoring large numbers
  • Solving problems in theoretical physics
  • Solving optimization problems in many variables

The main difficulty that the research-and-development engineers have encountered is the fact that it is extremely difficult to get particles to behave in the proper way for a significant length of time. The slightest disturbance will cause the machine to cease working in quantum fashion and revert to "single-thought" mode like a conventional computer. Stray electromagnetic fields, physical movement, or a tiny electrical discharge can disrupt the process.

This was last updated in June 2010

Continue Reading About quantum computer

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close