quantum information

Quantum Computing Science

Bell’s Inequality: The weirdest theorem in the world that won a Nobel Prize in 2022

John Clauser, Alain Aspect and Anton Zeilinger won the Nobel Prize in physics for 2022. Their work built off of one of the most important results in all of physics; Bells Theorem, invented by the late John Stewart Bell. Here we discuss why Bells Theorem is one of the most important, yet bizarre, results in […]

Read More
Quantum Computing

Bell’s Inequality: The weirdest theorem in the world | Nobel Prize 2022

This week John Clauser, Alain Aspect and Anton Zeilinger won the Nobel Prize in physics for 2022. Their work built off of one of the most important results in all of physics; Bells Theorem, invented by the late John Stewart Bell. The following videos discuss why Bells Theorem is one of the most important, yet […]

Read More
Quantum Computing

Best College Majors for Quantum Computing

Want a job in quantum but not sure where to start? If you’re still in school, the first choice you are going to have to make is your college major. Traditionally, most everyone working in quantum information science had a background in physics, but today that is not the case. In this video, Olivia discusses […]

Read More
Quantum Computing

Quantum-Enhanced Markov Chain Monte Carlo Simulations with David Layden

Here’s a talk by David Layden on Quantum-Enhanced Markov Chain Monte Carlo Abstract: Sampling from complicated probability distributions is a hard computational problem arising in many fields, including statistical physics, optimization, and machine learning. Quantum computers have recently been used to sample from complicated distributions that are hard to sample from classically, but which seldom […]

Read More
Quantum Computing

Quantum Simulations of Topological Majorana Modes with Oles Shtanko

Quantum Simulations of Topological Majorana Modes Abstract: Modern quantum devices can now outperform classical computers in physical simulations, which makes them an important tool for future physics research. As an example, I will focus on simulating the topological states of matter hosting Majorana modes — the exotic “half-electron” states. Observing Majorana modes in the lab […]

Read More
Quantum Computing

From Many-Body to Many-Time Physics with Gregory A.L. White

An interesting talk on quantum correlations and how they relate to quantum computing. Abstract: Quantum correlations in time have a surprisingly similar structure as spatial quantum correlations, formally related via the Choi-Jamiolkowski isomorphism. As a consequence, multi-time processes are endowed with the same richness as many-body physics, including temporal entanglement and well-defined causal structures. We […]

Read More
Quantum Computing

Microwave Amplifiers for Quantum Information Processing with Florent Q. Lecocq

Speaker Florent Q. Lecocq explains the use of microwave amplifiers for QIP. Abstract: In the late 2000s, the application of low-noise parametric amplifiers to cryogenic microwave measurements revolutionized the field of quantum information processing with superconducting circuits. For example, it enabled high-fidelity dispersive qubit readout, a ubiquitous tool in current superconducting quantum computers. Importantly, it […]

Read More
Quantum Computing

Where Do We Go Next with Quantum Computing?

QC40 was a one-day virtual event that celebrated the 40th anniversary of the Physics of Computation Conference, which was jointly organized by MIT and IBM and held in the Endicott House on the MIT campus in 1981. We consider this conference a defining moment in the history of quantum computation. At QC40, we looked at […]

Read More
Quantum Computing Security

What is Quantum Cryptography?

In this video, Sabine Hossenfelder explains how public key cryptography works on the internet today, using RSA as example, what the risk is that quantum computers pose for internet security, what post-quantum cryptography is, how quantum key distribution works, and what quantum cryptography is. Video contents: 0:00 Intro 0:31 Public Key Cryptography 2:43 Risk posed […]

Read More