#### Where Do We Go Next with Quantum Computing?

- Frank
- August 5, 2021
- Endicott
- Genius
- History of Quantum
- IBM
- ibm quantum
- Keynote
- Mad Scientist
- Physics
- QC40
- qiskit
- Quantum Computing
- quantum information
- quantum information and computation
- quantum information meets quantum matter
- quantum information paradox
- quantum information processing
- quantum information science
- quantum information science degree
- quantum information systems
- quantum information technology
- Smarty Pants
- Steve Girvin
- Steven Girvin
- Superconducting
- Yale
- Yale University

QC40 was a one-day virtual event that celebrated the 40th anniversary of the Physics of Computation Conference, which was jointly organized by MIT and IBM and held in the Endicott House on the MIT campus in 1981. We consider this conference a defining moment in the history of quantum computation. At QC40, we looked at […]

Read More#### Grovers Algorithm with Qiskit

- Frank
- February 4, 2021
- 50 qubits
- Algorithm
- API
- Cloud
- Coding
- Developer
- Development
- fourier transform
- Getting Started
- hello world
- IBM
- IBM Research
- Jupyter
- Microsoft
- Open Source
- Physics
- programming quantum computers
- Python
- qiskit
- Quantum
- quantum algorithms
- quantum computer programming
- Quantum Computers
- quantum fourier transform
- quantum information
- Quantum Mechanics
- Quantum Physics
- quantum programming
- Qubit
- rigetti
- science
- SDK
- shor's
- Shor's Algorithm
- Software

In this video, Jin-Sung Kim, PhD explains how some quantum algorithms can outperform their classical counterpart and shows us how to implement Grover’s Algorithm.

Read More#### What is Quantum Cryptography?

In this video, Sabine Hossenfelder explains how public key cryptography works on the internet today, using RSA as example, what the risk is that quantum computers pose for internet security, what post-quantum cryptography is, how quantum key distribution works, and what quantum cryptography is. Video contents: 0:00 Intro 0:31 Public Key Cryptography 2:43 Risk posed […]

Read More