recommended reading

Nobel award for quantum discovery coincides with In-Q-Tel investment

David Wineland

David Wineland // Ed Andrieski/AP

Scientists won the Nobel prize in physics for discovering ways to measure quantum particles without destroying them, Reuters and other news outlets reported. Their findings enable researchers to study the behavior of quantum particles, which exist at scales invisible to the eye, and bring within reach the elusive goal of building a super computer that powers complicated computational processes.

David Wineland, a physicist at the National Institute of Standards and Technology, was able to hit an atom with laser light and observe the atom at two different locations. Serge Haroche,  a professor at the College de France and Ecole Normale Superieure in Paris, has controlled and measured trapped photons, or particles of light, by sending atoms through a trap.

"Their ground-breaking methods have enabled this field of research to take the very first steps towards building a new type of superfast computer based on quantum physics," according to the academy, Bloomberg reported. "The research has also led to the construction of extremely precise clocks that could become the future basis for a new standard of time."

The U.S. government has been looking with increasing interest at how quantum principles could be applied to data-processing and navigation systems. Canadian company D-Wave Systems announced last week that it raised $30 million to develop quantum computing systems; CIA venture capital arm In-Q-Tel participated in the latest funding round, the firm said.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.