Skip to main content

Will Quantum Computer replace Classical computer?


I would like to start this topic with 2 facts:

1.Classical computer have enabled amazing things. Like the internet, communication and many more.

2.But There are still problems that we can’t solve.

Classical computer fundamentally works on Binary bits i.e. 0’s and 1’s. Major drawback of classical computer in some field is that it checks one instruction at a time. And in some high-level mathematical problems checking 1 instruction at a time can take thousands of years to complete the problem because of less computational power.
Here to overcome this problem companies like IBM Google Intel Microsoft and many more are developing the new type of computer called quantum computer in which they have some what had successful. Even Government of India is making effort to develop Quantum Computer. In the Budget  2020 Government of India has allocated 8000 crore for the application of Quantum Computer.

So, what is Quantum Computer?

Quantum computer are those computers which use quantum physic such as superposition and entanglement to perform computation.

Quantum computer fundamentally works on Qubit i.e. it can be 0’s or 1’s or mixer of both. This property comes under superposition which will be cover in next blog.

To understand the basic working of Quantum computer. Let’s take an example where we will compare classical and quantum computer.

We make both computers play a game were the object have to find a path to get from location A to B.

What classical computer will check every path one by one until it gets the correct path. 


Now on the same hand Quantum computer will go to every possible path at a same time i.e. work parallel and find the path.

 This happen because of the properties of qubit. In depth details about the working of the quantum computer is in next blog.

Will Quantum Computer replace Classical Computer?

No, Quantum computer can’t replace classical computer because many factors.
1.      Quantum computer are designed to do complex task with ease, they are not meant to be use in regular basis.
2.      To run this type computer the temperature is to be maintain absolute zero which colder than space.

     




Comments

Popular posts from this blog

Hustle

The innate hunger to build,create,do something & try. Hustle isn't just working on the things you like,it means doing the things you don't enjoy so you can do the things you love. Hustle:The ability to make things happen in light of knowing,how to get there ,but operate with the general principle that action breed results. Hustle stands for: H - How U - U  S -  Survive T -  The L - life  E - Everyday Some days I'm Humble. Some days I  Struggle. But everyday I Hustle. Remember Every Boss started as a worker.

Authentication Authorization Accounting(week 3)

Identification is the idea of describing an entity uniquely. Biometric authentication is the process of using unique physiological characteristics of an individual to identify them. C.R.L(Certificate revocation list) :This is a signed list published by the CA which defines certificates that have been explicitly revoked. Lightweight Directory Access Protocol(LDAP): LDAP is an open industry-standard protocol for accessing and maintaining directory services. Authentication is related to verifying the identity a user, authorization pertains to describing what the user account has access to or doesn't have access to. An access control list or ACL , is a way of defining permissions or authorizations for objects.  RADIUS or Remote Authentication Dial-In User Service , is a protocol that provides AAA services for users on a network.It's a very common protocol used to manage access to internal networks, WiFi networks, email services and VPN services. when a client wants to access a r...

Secure Network(Week 4)

Network hardening is the process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps.   Implicit deny is a network security concept where anything not explicitly permitted or allowed should be denied. Analyzing logs is the practice of collecting logs from different networks and sometimes client devices on your network, then performing an automated analysis on them. Correlation analysis is the process of taking log data from different systems and matching events across the systems. Flood guards provide protection against Dos or denial of service attacks. EAP-TLS is an authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server.   if you really want to lock down your network, you can implement 802.1x . DHCP Snooping Attack Why WEP Encryption fall apart? A general concept in security and encryption is to never send the plain ...