#### Quantum-Enhanced Markov Chain Monte Carlo Simulations with David Layden

- Frank
- June 18, 2022
- ibm quantum
- Machine Learning
- qiskit
- Quantum
- Quantum Computing
- quantum computing 2021
- quantum computing algorithms
- quantum computing and cryptocurrency
- quantum computing applications
- quantum computing bitcoin
- quantum computing course
- quantum computing explained
- quantum computing for computer scientists
- quantum computing for dummies
- quantum computing lecture
- quantum information
- quantum machine learning
- Qubit
- Research
- Research Seminar
- seminar
- seminar series

Here’s a talk by David Layden on Quantum-Enhanced Markov Chain Monte Carlo Abstract: Sampling from complicated probability distributions is a hard computational problem arising in many fields, including statistical physics, optimization, and machine learning. Quantum computers have recently been used to sample from complicated distributions that are hard to sample from classically, but which seldom […]

Read More#### Quantum Simulations of Topological Majorana Modes with Oles Shtanko

- Frank
- June 10, 2022
- ibm quantum
- Machine Learning
- qiskit
- Quantum
- Quantum Computing
- quantum computing 2021
- quantum computing algorithms
- quantum computing and cryptocurrency
- quantum computing applications
- quantum computing bitcoin
- quantum computing course
- quantum computing explained
- quantum computing for computer scientists
- quantum computing for dummies
- quantum computing lecture
- quantum information
- quantum machine learning
- Qubit
- Research
- Research Seminar
- seminar
- seminar series

Quantum Simulations of Topological Majorana Modes Abstract: Modern quantum devices can now outperform classical computers in physical simulations, which makes them an important tool for future physics research. As an example, I will focus on simulating the topological states of matter hosting Majorana modes — the exotic “half-electron” states. Observing Majorana modes in the lab […]

Read More#### From Many-Body to Many-Time Physics with Gregory A.L. White

- Frank
- June 6, 2022
- ibm quantum
- Machine Learning
- qiskit
- Quantum
- Quantum Computing
- quantum computing 2021
- quantum computing algorithms
- quantum computing and cryptocurrency
- quantum computing applications
- quantum computing bitcoin
- quantum computing course
- quantum computing explained
- quantum computing for computer scientists
- quantum computing for dummies
- quantum computing lecture
- quantum information
- quantum machine learning
- Qubit
- Research
- Research Seminar
- seminar
- seminar series

An interesting talk on quantum correlations and how they relate to quantum computing. Abstract: Quantum correlations in time have a surprisingly similar structure as spatial quantum correlations, formally related via the Choi-Jamiolkowski isomorphism. As a consequence, multi-time processes are endowed with the same richness as many-body physics, including temporal entanglement and well-defined causal structures. We […]

Read More#### Microwave Amplifiers for Quantum Information Processing with Florent Q. Lecocq

- Frank
- January 30, 2022
- ibm quantum
- Machine Learning
- qiskit
- Quantum
- Quantum Computing
- quantum computing 2021
- quantum computing algorithms
- quantum computing and cryptocurrency
- quantum computing applications
- quantum computing bitcoin
- quantum computing course
- quantum computing explained
- quantum computing for computer scientists
- quantum computing for dummies
- quantum computing lecture
- quantum information
- quantum machine learning
- Qubit
- Research
- Research Seminar
- seminar
- seminar series

Speaker Florent Q. Lecocq explains the use of microwave amplifiers for QIP. Abstract: In the late 2000s, the application of low-noise parametric amplifiers to cryogenic microwave measurements revolutionized the field of quantum information processing with superconducting circuits. For example, it enabled high-fidelity dispersive qubit readout, a ubiquitous tool in current superconducting quantum computers. Importantly, it […]

Read More#### Where Do We Go Next with Quantum Computing?

- Frank
- August 5, 2021
- Endicott
- Genius
- History of Quantum
- IBM
- ibm quantum
- Keynote
- Mad Scientist
- Physics
- QC40
- qiskit
- Quantum Computing
- quantum information
- quantum information and computation
- quantum information meets quantum matter
- quantum information paradox
- quantum information processing
- quantum information science
- quantum information science degree
- quantum information systems
- quantum information technology
- Smarty Pants
- Steve Girvin
- Steven Girvin
- Superconducting
- Yale
- Yale University

QC40 was a one-day virtual event that celebrated the 40th anniversary of the Physics of Computation Conference, which was jointly organized by MIT and IBM and held in the Endicott House on the MIT campus in 1981. We consider this conference a defining moment in the history of quantum computation. At QC40, we looked at […]

Read More#### Grovers Algorithm with Qiskit

- Frank
- February 4, 2021
- 50 qubits
- Algorithm
- API
- Cloud
- Coding
- Developer
- Development
- fourier transform
- Getting Started
- hello world
- IBM
- IBM Research
- Jupyter
- Microsoft
- Open Source
- Physics
- programming quantum computers
- Python
- qiskit
- Quantum
- quantum algorithms
- quantum computer programming
- Quantum Computers
- quantum fourier transform
- quantum information
- Quantum Mechanics
- Quantum Physics
- quantum programming
- Qubit
- rigetti
- science
- SDK
- shor's
- Shor's Algorithm
- Software

In this video, Jin-Sung Kim, PhD explains how some quantum algorithms can outperform their classical counterpart and shows us how to implement Grover’s Algorithm.

Read More#### What is Quantum Cryptography?

In this video, Sabine Hossenfelder explains how public key cryptography works on the internet today, using RSA as example, what the risk is that quantum computers pose for internet security, what post-quantum cryptography is, how quantum key distribution works, and what quantum cryptography is. Video contents: 0:00 Intro 0:31 Public Key Cryptography 2:43 Risk posed […]

Read More