Insight Search

Sort by:
  • Podcast

    August 24, 2022
    Um bessere Quantencomputer zu bauen, muss jede Komponente optimiert werden. Was wäre, wenn es ein Quanten-CAD-Tool gäbe, das bei der Entwicklung zuverlässigerer Qubits oder effektiverer Quantenspeicher helfen könnte? Quantopticon hat ein Software-Design-Tool entwickelt, das photonische Quantencomputer dabei unterstützen soll
  • Podcast Transcript

    August 24, 2022
    Building better quantum computers requires improving every component. What if there was a quantum CAD tool that could help develop higher-fidelity qubits or effective quantum memory? Quantopticon has developed a software design tool to help photonic quantum computing live up to this promise. Join host Konstantinos Karagiannis for a chat about enabling the creation of futuristic components with…
  • Podcast Transcript

    October 5, 2022
    It’s hard to improve the purity of an atom. Identical and easy to find, atoms such as those in ytterbium can make flawless qubits. We only need to be able to trap and control them. Can using trapped ions as qubits therefore yield the most powerful quantum computers on the planet? How scalable is this approach on the road to quantum advantage? Join host Konstantinos Karagiannis for a chat about…
  • Podcast Transcript

    September 21, 2022
    Are you interested in becoming a quantum coder? The job market looks as large as the machines are cold. We’re all struggling in the quantum computing industry to find talent. Do you have what it takes? You may even be able to get started with less experience than you think. Join host Konstantinos Karagiannis for a chat about the path to this exciting career with Peter Noell from ColdQuanta.…
  • Podcast

    September 21, 2022
    Interessieren Sie sich dafür, Quantum Coder zu werden? Der Arbeitsmarkt ist groß, die Quantencomputing-Branche sucht händeringend nach Talenten. Haben Sie das Zeug dazu? Vielleicht können Sie sogar mit weniger Erfahrung einsteigen, als Sie denken
  • Whitepaper

    March 21, 2023
    The Financial Action Task Force (FATF) has long warned that criminals leverage virtual assets not only for predicate or money-laundering offenses but also to evade financial sanctions and raise funds to support terrorism. Even so, the number of recent headlines about criminal activity and sanctions evasion in the crypto industry is alarming. Cryptocurrency-based crime hit an all-time high of $20.…
  • Podcast

    June 1, 2022
    Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon…
  • Podcast Transcript

    June 1, 2022
    Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisationSecurity metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
Loading...