Browse Definitions :
Definition

quantum internet

The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves. If implemented, the quantum internet is intended to eventually complement the current system of interconnected computers that share information through classical computing means, such as over standard communication protocols that physically connect networks over geographical space.

While still in the developmental phase, the quantum internet could have major implications in a wide range of fields. The quantum internet would most likely become a specialized branch of the classic internet, making it a solution for very specialized applications. Scientists could connect to advanced quantum computers remotely or link up machines within a lab in order to simulate quantum physics experiments. Government agencies could use quantum internet technology to advance more strategic election processes, where voters could superimpose combinations. The quantum internet would also be superior in sending information securely through quantum encryption or cryptography.

Key features of quantum theory applied to the quantum internet

The proposed quantum internet is based on quantum computing, a type of computing based on the major tenets of quantum theory.

  • Quantum computing- Quantum computing is a viable technology with various real world applications in use by different academic and private organizations, such as IBM Q Experience and MIT. It involves the sharing of information at atomic and subatomic levels through quantum channels. Compared to classical computing, it can share information at infinitely higher rates and with vastly fewer limitations. It is also a great deal more secure than classical computing.
  • Qubits- A quantum internet would allow computers to share quantum information between quantum computers, also called qubits. A qubit cannot be interpreted with standard hardware and it cannot be copied or destroyed. It serves a similar purpose in quantum computing to a binary character in traditional computing. The number of qubits in a particular quantum system also determines its processing power. For instance, a quantum computer can have 5-qubit processing power.
  • Superposition- There is no way to broadcast qubits. Instead, quantum information needs to be shared via two quantum processes, quantum superposition and quantum Entanglement. Superposition is a unique occurrence in which a quantum system can occupy many states at once. In traditional computing, a computer can only ever be in a single state at one time. For particles in the instance of quantum computing, this can mean a particle splitting, in a sense, and becoming duplicated but identical, or effectively existing in two places at the same time.
  • Entanglement- Entanglement is a phenomenon in quantum theory where two particles of matter or energy are connected and behave similarly, even when they are separated by a great distance. This process is a necessary part of teleportation theory and other advanced technologies. Due to the fact information shared by quantum entanglement does not need to travel a physical distance between the particles, it has incredible implications for computing, because changes made to one can be instantaneously applied to another, making processing power or even speed obsolete. This could theoretically also mean the disappearance of unfriendly interception of information, creating opportunities for secure cryptography.
  • Quantum infrastructure- In order to hold information, quantum computers must be kept at extremely low temperatures. In some cases qubits are stored within superconducting wire that is held in a refrigerator with temperatures as low as absolute zero, or the lowest measurable temperature.
This was last updated in January 2019

Continue Reading About quantum internet

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...

  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

Close