Tag: Fullstack

Posted in technology

Intel touts ‘full-stack’ approach to quantum innovation

Intel has used its appearance at the IEEE International Conference on Quantum Computing and Engineering to discuss its “full-stack” approach to quantum innovation, which it has touted spans across hardware, software, and algorithm development.

According to the company, its body of work highlights important advances across those areas, which it said were critical for building scalable commercial-grade quantum systems that can run useful applications. 

Dr Anne Matsuura, director of quantum applications and architecture at Intel Labs, said quantum research within Intel Labs has made “solid advances in every layer of the quantum computing stack”, including with spin qubit hardware and cryo-CMOS technologies for qubit control, and software and algorithms research that she said would put researchers on the path to a scalable quantum architecture for useful commercial applications.

“Quantum computing is steadily transitioning from the physics lab into the domain of engineering as we prepare to focus on useful, nearer-term applications for this disruptive technology,” she added.

“Taking this systems-level approach to quantum is critical in order to achieve quantum practicality.”

As quantum is an entirely new compute paradigm, Intel said it requires a new stack of hardware, software, and algorithms in order to run future applications on a full-scale commercial quantum system.

 “Simulations can help provide an understanding of how to build all components of the full quantum stack, taking workload requirements into consideration before they get built in real quantum hardware,” Intel said. “Quantum research efforts across this stack are all necessary today so that as the hardware matures, useful applications are ready to run on near-term smaller qubit quantum machines.”

This approach, Intel said, is central to its strategy of taking a “systems-oriented, workload-driven” view of quantum computing, which is the foundation of its vision of quantum practicality.

The company presented its quantum research at IEEE, spanning

Posted in technology

Full-stack, multilayered security features for a changing world

Remote is the new rule

The trend towards remote working has been steady for some time, and recent events are accelerating that pace. According to 2012 Gallup research, 39% of the U.S. workforce was working off-site at least part-time. By 2016, that number had risen to 43%1. It’s fair to assume that if the question was asked in 2020, that number will have grown dramatically.

While it’s impossible to predict what happens next, it’s clear that remote working will now be more permanent in many organizations. Whether it’s employees working from home, students engaging in distance learning, or family and friends catching up using web and video conferencing, there is in fact a new normal emerging: remote connectivity and collaboration.

New paradigm, new problems: securing the modern workplace

These cultural and organizational shifts have made confidential personal and business data a more attractive target for cybercriminals. Since traditional home networks are considered less secure than enterprise networks, remote users’ computer systems can be perceived as a weak security link and thus more prone to cyberattacks. According to a study, 86% of business executives agreed data breaches are more likely to occur when employees are working out of office2.

This move to more remote work also happens as cyberattacks are becoming increasingly sophisticated, with threats targeting low-level firmware becoming more prominent. To stay ahead of busy bad actors and ever-evolving threats, IT teams need to give end customers integrated hardware and software solutions that offer comprehensive security features for the entire system.

The AMD “Zen” advantage: comprehensive hardware-based security

While software security is important, it may be easily bypassed by exploiting known platform vulnerabilities. This is one reason hardware-based security (HBS) is gaining more importance. It works to complement software security and provides a stronger foundation for