Feeds

US boffins build, test working 2-qubit quantum processor

Beryllium ions used in place of undead cats

Secure remote control for conventional and virtual desktops

Federal boffins in America say they have built the first computer processing device able to handle quantum-mechanical numbers expressed as "qubits". Whereas a regular bit is either 1 or 0, a qubit can be 1, 0 or some of both just as a metaphorical cat in a box may be dead, alive or in a mysterious semi-undead waveform zombie condition.

The device was developed by scientists at the US National Institute of Standards and Technology (NIST). According to the inventors, the new kit is a step forward on earlier and more primitive quantum gear in that it is programmable.

"This is the first time anyone has demonstrated a programmable quantum processor for more than one qubit," says NIST postdoc researcher David Hanneke. "It's a step toward the big goal of doing calculations with lots and lots of qubits. The idea is you'd have lots of these processors, and you'd link them together."

The machine's two qubits are held in the form of individual beryllium ions, which "are held in an electromagnetic trap and manipulated with ultraviolet lasers". There are also a brace of magnesium ions in the trap for the purpose of cooling the beryllium ions.

The NIST crew say they have verified that their gear is properly programmable by testing out 160 of the possible different programs one can write for a two-qubit device. Though there are an infinity of possible programs, according to the scientists, their properly-random check of 160 is sufficiently representative to show that the device works.

If many such devices could be successfully hooked together to create a quantum computer, various major consequences could be expected - not least the breaking of encryption regarded today as completely uncrackable. The NIST announcement, unsurprisingly, mentions the importance of the team's work to "national priority areas, such as information security", and the US military are also known to be interested in the idea.

There's plenty of work ahead before practical quantum computers can be assembled, however. At the moment, the 2-qubit processor is only 79 per cent accurate. With many such devices working together, this would be unacceptable. The NIST team acknowledge that accuracy needs to be "boosted substantially" before much progress can be made.

Hanneke and his colleagues' paper, Realization of a programmable two-qubit quantum processor, is published in Nature Physics. It can also be read online here (pdf). ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
Troll hunter Rackspace turns Rotatable's bizarro patent to stone
News of the Weird: Screen-rotating technology declared unpatentable
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.