The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing. The second thing to know: Quantum computing is still a nascent technology that probably won’t be ready for prime time for several more years.And the third thing you should know? The time to start protecting your data’s security from quantum computers is now.[ Learn how server disaggregation can boost data center efficiency and how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ]
Here’s an overview of what you should know about quantum computing.To read this article in full, please click here
There are two main camps in the quantum computing development, says Ashish Nadkarni, Program Vice President of Computing Platforms, Worldwide Infrastructure at IDC. In the first camp are entrenched players from the world of classical computing. And in the second are quantum computing startups.“It’s a highly fragmented landscape,” Nadkarni says. “Each company has its own approach to building a universal quantum computer and delivering it as a service.”[ Now see What is quantum computing [and why enterprises should care.]
Classic-computing vendors pioneer quantum computing
Along with IBM, other classical computing companies staking a claim in the emerging field of quantum computing include:To read this article in full, please click here
The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing. The second thing to know: Quantum computing is still a nascent technology that probably won’t be ready for prime time for several more years.And the third thing you should know? The time to start protecting your data’s security from quantum computers is now.[ Learn how server disaggregation can boost data center efficiency and how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ]
Here’s an overview of what you should know about quantum computing.To read this article in full, please click here
There are two main camps in the quantum computing development, says Ashish Nadkarni, Program Vice President of Computing Platforms, Worldwide Infrastructure at IDC. In the first camp are entrenched players from the world of classical computing. And in the second are quantum computing startups.“It’s a highly fragmented landscape,” Nadkarni says. “Each company has its own approach to building a universal quantum computer and delivering it as a service.”[ Now see What is quantum computing [and why enterprises should care.]
Classic-computing vendors pioneer quantum computing
Along with IBM, other classical computing companies staking a claim in the emerging field of quantum computing include:To read this article in full, please click here
The fastest of the fastImage by ThinkstockYes, your new gaming PC that supports VR headsets is impressively fast. But can it simulate the entire universe over millions of years? Shed light on the forces that cause destructive summer storms in Europe? Ensure the safety and reliability of nuclear weapons? We didn’t think so; those are jobs for supercomputers.To read this article in full or to leave a comment, please click here
The fastest of the fastImage by ThinkstockYes, your new gaming PC that supports VR headsets is impressively fast. But can it simulate the entire universe over millions of years? Shed light on the forces that cause destructive summer storms in Europe? Ensure the safety and reliability of nuclear weapons? We didn’t think so; those are jobs for supercomputers.To read this article in full or to leave a comment, please click here
Virtual assistants like Apple’s Siri, Microsoft’s Cortana and Google Now have the potential to make enterprise workers more productive. But do “always listening” assistants pose a serious threat to security and privacy, too?Nineteen percent of organizations are already using intelligent digital assistants, such as Siri and Cortana, for work-related tasks, according to Spiceworks’ October 2016 survey of 566 IT professionals in North America, Europe, the Middle East and Africa. The survey also found that 46 percent of organizations plan to adopt intelligent assistants within five years.To read this article in full or to leave a comment, please click here
Virtual assistants like Apple’s Siri, Microsoft’s Cortana and Google Now have the potential to make enterprise workers more productive. But do “always listening” assistants pose a serious threat to security and privacy, too?Nineteen percent of organizations are already using intelligent digital assistants, such as Siri and Cortana, for work-related tasks, according to Spiceworks’ October 2016 survey of 566 IT professionals in North America, Europe, the Middle East and Africa. The survey also found that 46 percent of organizations plan to adopt intelligent assistants within five years.To read this article in full or to leave a comment, please click here
A 2015 research study concluded that walking at a treadmill desk for two hours a day can improve blood pressure and sleep, among other health benefits. Treadmill desks are particularly attractive to busy office workers who are primarily sedentary and have little time for working out. Instead of devoting, say, an hour to a walk, you can walk all day and still get your work done — at least in theory.A treadmill desk may also be compelling to a company’s employee fitness challenge competitors. But some wristband activity trackers won’t log all treadmill steps while your hands rest on the desktop. (Check out these Fitbit community threads, for example.)To read this article in full or to leave a comment, please click here
The risks from corporate use of activity trackers and other wearables is low, some experts say -- especially in comparison to all the other security and privacy risks CISOs, CIOs and IT folks must worry about.To read this article in full or to leave a comment, please click here(Insider Story)
The risks from corporate use of activity trackers and other wearables is low, some experts say -- especially in comparison to all the other security and privacy risks CISOs, CIOs and IT folks must worry about.That said, as with any connected device, there is risk potential. For example, recent research suggests that devices such as Fitbits can be hacked (when the hacker is within close proximity). By focusing on accelerometers and other motion sensors, researchers at the University of Michigan and the University of South Carolina found that it’s possible to, among other things, use sound waves at different frequencies to add thousands of steps to a Fitbit. (Scroll down to read Fitbit’s response to the research results.)To read this article in full or to leave a comment, please click here(Insider Story)
10 offbeat trackers and wacky wearables Image by CIOAre you feeling worn out by wearables? Can’t stand the thought of strapping yet another heart-rate-sensing, step-counting, sleep-tracking watch around your wrist? I feel your pain. As someone who frequently reviews activity trackers, I don’t often see bold new features in mainstream devices. But if you look closely at small startups around the globe, you’ll start to notice some cool, slightly crazy, definitely out-there devices that go far beyond counting steps. Some of the claims these device developers make will likely make your eyes roll. Nonetheless, here are 10 wacky wearables and oddball devices that may also pique your curiosity.To read this article in full or to leave a comment, please click here
At the end of each year, many of us attempt to turn the technology we no longer need into cash. You could be cleaning out the drawers or closets to which you banished old gadgets. Perhaps you treated yourself to a Surface Studio or MacBook Pro and need some extra money to pay for that pricey new computer.To read this article in full or to leave a comment, please click here(Insider Story)
According to a set of intelligent humans interviewed for this story, artificial intelligence (AI) and machine learning are going to help drive the tech economy in 2017.When CIO.com posted a query on Help a Reporter Out, a site designed to help journalists connect with sources, asking about startup trends to watch in 2017, the overwhelming majority of respondents pointed to AI. This coming year and beyond, AI will help companies "disrupt sectors that haven't been fully disrupted," says Anthony Glomski, principal of AG Asset Advisory, a financial advisory firm. "AI is in its beginning stages with massive potential impact."To read this article in full or to leave a comment, please click here
According to a set of intelligent humans interviewed for this story, artificial intelligence (AI) and machine learning are going to help drive the tech economy in 2017.When CIO.com posted a query on Help a Reporter Out, a site designed to help journalists connect with sources, asking about startup trends to watch in 2017, the overwhelming majority of respondents pointed to AI. This coming year and beyond, AI will help companies "disrupt sectors that haven't been fully disrupted," says Anthony Glomski, principal of AG Asset Advisory, a financial advisory firm. "AI is in its beginning stages with massive potential impact."To read this article in full or to leave a comment, please click here
Despite the fact that they received plenty of media attention during the past few years, "proximity" mobile payments, or mobile payments made at retailers' points of sale (PoS), have yet to hit the mainstream. Multiple reasons why exist, but perhaps the most significant roadblock thus far: Today's mobile payment systems simply don't offer a strong enough value proposition to compel consumers to use them consistently.To date, the market has seen four alternative-payment success stories, according to Penny Gillespie, a research director of digital commerce with Gartner: PayPal, for online payments; Visa Signature debit cards; payroll cards; and gift cards. Each option offers "strong value propositions to consumers, as well as to merchants," Gillespie says, because they provide something new and beneficial that wasn't available before. Gift cards, for example, let consumers to easily send funds to friends and family, they make it easy for recipients to spend that money, and they drive recipients to stores, which benefits retailers. To read this article in full or to leave a comment, please click here
The best 'smart luggage'Luggage is long overdue for some serious innovation. The last big breakthrough — wheeled suitcases — rolled out in 1970. Crowdfunded startups and established luggage companies seem to have suddenly realized the market opportunity, and they are adding Wi-Fi hot spots, Bluetooth, SIM cards, GPS and built-in batteries to their products.To read this article in full or to leave a comment, please click here
Editor’s note: Traction Watch is a new column focused obsessively on growth, and is a companion to the DEMO Traction conference series, which brings together high-growth startups with high-potential customers. The next DEMO Traction will take place in Boston on September 16, 2015. Growth companies can apply to present, or those similarly obsessed can register here to attend. This is the fourth in a series of posts profiling the Spring 2015 Demo Traction Champions. Talkdesk was named a Traction Watch: Smart Data Champion. Read more about the winners in “Traction Watch: Meet The Spring 2015 DEMO Traction Champions.”To read this article in full or to leave a comment, please click here
Thanks to its inherent "openness," the open source Android OS is vulnerable to a variety of security risks, but how often do people you know actually fall victim to Android malware or other attacks?Is the Android security risk overstated? Is the Android risk really greater than the risks posed by its iOS and Windows Mobile counterparts? And what can users, and the enterprise IT departments that support them, do to better protect their Android devices? + ALSO: Researchers build security framework for Android +To read this article in full or to leave a comment, please click here
The security pros interviewed for our article, "Experts bust Android security myths," offered up the following eight Android security tips for IT administrators and users1) Don't root that Android device"To do significant damage in the mobile world, malware needs to act on devices that have been altered at an administrative level," according to Dionisio Zumerle, principal research analyst at Gartner. "The most obvious platform compromises of this nature are 'jailbreaking' on iOS or 'rooting' on Android devices ...To read this article in full or to leave a comment, please click here