Quantum computing is the theoretical arrangement of systems that makes a direct use of phenomena known as quantum-mechanical phenomena i.e. entanglement and superstitions, to perform operations and handle data. Quantum computers are different from ordinary binary computers and are transistors based systems. They use qubits or quantum bits to perform operations. Though quantum computer is still in concept stage and hasn’t been developed yet, its theoretical model has been stated and is called Quantum Turing Machine. The development of quantum computers is still in first stage but researchers have carried out experiments in which operations via quantum computers were executed but in very small number of quantum bits. Currently not developed, but in order to develop a quantum computer we will require the things stated below which will formulate the physical, logical, procedural and societal properties of a quantum computer:
Physical Structure- To develop a quantum computer we would require a structurewhich would be isolated from the environment and is coupled to some more qubits to be built in a controllable manner. Once the development of qubit is done, the next thing we require will be a fault resistant architecture to store those qubits. The next thing which makes the properties of a quantum computer is universal gates, measurement and initialization of those qubits. Though this will make a physically active quantum computer, but to achieve this is still a challenge but according to researchers over the next few years with technological advancements we will be able to make quantum computer with 50 or more qubits.(cs.ucsb.edu 017)
Logical Structure- Ordinary computers are based on binary system of working while a quantum computer uses the arrangement of qubits for working. The logic behind working of a quantum computer is the fact that microscopic atoms and electrons may not work or seem as they are expected to. Like photons they may also have a 2 phase polarization. This factor frees us from binary constraints and gives rise to a new hope known as quantum computing. A normal computer works on the arrangement of ones and zeros but a quantum computer uses qubits which can either be one or zero or anything in between which gives it a scope to explore vast number of possibilities which a isn’t possible for a normal computer. The technology can give answer to most complex math problem because of greater power and speed.(IJSTRM 2017) (Gruska 2017)
Procedural Structure- A quantum computer is based on fault tolerant architecture. This architecture is comprised of two primary layers i.e. a physical and a logical qubit layer. The lower physical qubit layer comprises of qubits that are controlled by a QEC processor which is a classical processor which uses measured outcomes of physical qubits to generate a QEC code.(Communications of the ACM 2017) (Rodney Van Meter 2017) The processor keeps track of the errors that arise during calculation and then implements the feedbacks and recommendations on the controls of the physical qubit layer. Described below is the systematic arrangement of the layers of a quantum computer. (npj quantum information 2017) (Plus Magazine 2017)
The upper layer in the figure is the logical layer and it is controlled by the feedbacks of the physical qubits. These logical qubits are encoded with an error free code and the logical controls are governed by a processor which determines how different quantum algorithms are to be implemented. At the very end is the physical layer of imperfect qubits which have been used and explored and researched in different situations like trapped ion, nuclear spin, solid-state spin, neutral atom and many more. The logic in this system is relatively varied so in order to normalize the process of quantum computing it is important to control the logics, lengths wherever possible. The number of operations per logic is a very promising number which can reach up to 104 operations. (npj quantum information 2017)
Social Procedure- Many big companies and organizations are turning their attention towards this technology. This emerging technology has the potential to exploit the physical properties of subatomic particles which enables it to make enormous amount of calculations at a very unprecedented speed. The technology is extremely complicated and gives a promising solution to many problems but still the question left is whether it is as powerful as advertised? If successful, this technology can be of great use to banks and managers to make money at fast speed who deal with the technology of algorithm based trading. The technology can help managers and banks to find new ways of getting profits from differences in prices across markets and manipulate this situation to their advantage. Companies like Google and Microsoft are working on developing and learning algorithms that would work on a quantum computer and collaborate their research with the National Aeronautics and Space Administration which has one of the machines. According to NASA, the computer has demonstrated the capability of solving such equations in just a matter of seconds which when done by a super computer would take 10,000 years (Business Insider 2015, Go to the Globe and Mail 2015).
A quantum computer being a thousand times faster than a normal computer uses a four state qubits and a traditional two state transistors. This gives an exceptionally greater ability of computing to this technology and to someone who is familiar with the technology and would give the advantage over the rest of computer population. Though this technology is in development stage this extra power over rest of the systems comes with some ethical issues too. These issues are discussed below:
One of the main risks related with this technology is of hacking. Today hackers use bot-nets to hack into systems and then they string them together to form a group of computers to store and steal information. This crime is so common that according to the survey conducted in 2015, around 20% of the computers worldwide had been taken over by the hackers and this computing network is much more powerful than that of government. After the development of quantum computers, the processing speed will increase and normal systems would be exploited easily by qubits. Development of this technology would put world security at a considerable amount of risk. Introduction of this technology comes with the dilemma of providing the access to technology. It would be difficult to deter mind if the computers would be released for commercial purposes or not. The ACM code of Ethics adds to this as according to this law “People need to have an equal access to the computing technology”. The choice of not lending out this technology for individual purpose would result in substantial inequality in access to computers(E&T 2016)
Another ethical issue related to the development of quantum computers is that they are so powerful that they cannot be lent out for private purposes as it will violate the law of ‘Equal access to computing”. In the present situation even the super computers can be considered ethically wrong as they are mainly accessed by superpowers like US, UK, China etc. Presently the technology of quantum computing is still in development stage and it is not yet known about when the technology would be put to production due to fragile state of the processor. This situation has been faced in past when no one thought that development of personal computer was possible but it was proved false. It is expected from quantum technology to follow the same path(Ponnath 2017).
Another ethical issue related with quantum computing is that it violates patents and copyrights. People generally want to patent their software and certain mathematical equations. The issue is debatable because math is not considered as a property and should be made available to everyone. The same is being done with quantum computing. If the patent is applied on this technology, it would monopolize the entire technology which would make it hard to access. If a patent is applied on software related to quantum technology, it would deprive the other users its use and no one will be able to use the patented math equation which would make the problem solving process by this computer slow and cumbersome. As of now, the technology is in the beginning phase and still needs development and the future of this technology is expected to see lengthy and ethical debates.(Sharlow 2017).
The technology of quantum computing can easily be stated as the game changer in the world of Information Technology. But with great opportunities, comes great threats too. Likewise, the threat associated with quantum computing is that of security breach. The risk with the technology can have adverse effects on the personal as well as on national levels. Information of national security and the information stored with financial institutions are currently encrypted with long numeric codes, which a hacker won’t be able to crack easily and with trial and error approach it may take them hundreds of years but, technology used by quantum computers defy these rules of security. A quantum computer can easily decrypt these codes and keys and will penetrate into any kind of security. This is a global threat associated with quantum technology of computing. The introduction of technology brings the need for large organizations to hold and protect their data and develop security measures to cope with the problem.
Another risk related with this technology is that the technology is still a theory and is in development phase. The risks and the potential of the technology isn’t been identified yet. So it is not clear what will be the effects of this technology and how the technology can be manipulated if fallen into wrong hands.
The technology with potential risks poses a promising solution to many problems too. Following are the benefits of the technology of quantum computing:
Airplane safety- The technology will be able to use and run software that are too complex for classical silicon based computers for use. These Jet based software systems will help to identify risks and correct them before any mishap.
Discover distant planets- Quantum computers will help to identify and analyze the data collected by laboratories and seek out for earth like planets.
Helpful in elections- The technology will help to identify consumers and latest trends to use the information of marketing and exploit the preferences of individuals.
Boost GDP- The technology will also help to boost GDP via hyper-personalized advertising. This will stimulate consumer spending and increase individual contribution to GDP.
Automatic automobiles- The technology will help to analyze the pattern of traffic and human behaviour in different situations and invent technology that will work on its own and would not require any external application of logic.
Development of effective drugs- The technology can help to map amino acids and its nature. It can analyze DNA and sequence it into metric data which will help doctors to design and develop superior drug-based treatments.
Following are the recommendations to use the technology effectively and avoid its harmful effects:
The company and the government should be honest about the drawbacks of the technology and its potential outcomes. It will help the public to be prepared for the change and for the adversaries in the worst case scenario. It is necessary to find the understanding of what is going to happen and when it will happen.
The technology comes with both power and limitations and risks and benefits as well. It makes necessary to find about the specific character of quantum computing. The technology can be easily misunderstood for example- the notion that it can solve any problem easily that will be very hard for a normal computer. These notions need to be eliminated as the technology has its own limitations.
It should also be ensured that the users and third parties rely on the results of the technology. So it is to be made sure that the verification work is not solely focused on the technical audiences but on the broader constituencies too.
The companies should also engage in conversation with public and stakeholders. The point is old but needs emphasis. The companies should focus on wide outreach which will help public to get a broader picture of the technology.
The interested readers of this subject are expected to have a basic understanding of the quantum computing technology. The targeted audience of this report is Information and Communication Technology Professionals. For the readers who are not aware of this subject will get the knowledge after having a glimpse
The methodology used in creating this document on the topic “Quantum Computing” is secondary research and secondary data. The secondary research used in this project is precise, accurate, refined and is up to date. Secondary data allows the use of accurate information and no fake data and knowledge has been used. The research is detailed, specific and is up to date with latest data and information used up to our best knowledge.
Framework for Social Opportunity and Impact Risk Assessment (Huff and Martin 1995) |
Topics of Ethical Analysis |
|||||||||
Responsibility |
Ethical Issues |
|||||||||
Individual |
Professional |
Quality of Life |
Use of Power |
Risks & Reliability |
Property Rights |
Privacy |
Equity & Access |
Honesty & Deception |
||
Levels of Social Analysis |
Individuals |
X |
X |
X |
X |
X |
||||
Communities & Groups |
X |
X |
||||||||
Organisations |
X |
X |
X |
X |
X |
X |
||||
Cultures |
X |
|||||||||
Institutional Sectors |
X |
X |
X |
X |
X |
X |
X |
|||
Nations |
X |
X |
X |
X |
X |
X |
||||
Global |
X |
X |
X |
X |
||||||
Social opportunity and impact risk assessment |
Likelihood of Occurring |
Likely to occur of the technology is slipped into hands of Hackers. |
The race to get hands on technology |
Technology doesn’t guarantee results as it is in development stage |
Privacy invasion on government and other valuable information. |
||
Would occur with widespread use |
Could pose a major threat when used for private purposes. |
|||||
Likely to occur because technology would be expensive |
Technology can easily be accesses by rich terrorist organizations |
|||||
LOW |
||||||
LOW |
Opportunity / Impact / Consequence |
HIGH |
||||
Incidental |
Minor |
Significant |
Major |
Severe |
||
Local, small-scale, easily reversible change on social characteristics or values of the communities of interest or communities can easily adapt or cope with change. Local small-scale opportunities emanating from the project that the community can readily pursue and capitalise on. |
Short-term recoverable changes to social characteristics and values of the communities of interest or community has substantial capacity to adapt and cope with change. Short-term opportunitiesemanating from the project. |
Medium-term recoverable changes to social characteristics and values of the communities of interest or community has some capacity to adapt and cope with change. Medium-term opportunities emanating from the project. |
Long-term recoverable changes to social characteristics and values of the communities of interest or community has limited capacity to adapt and cope with change. Long-term opportunitiesemanating from the project |
Irreversible changes to social characteristics and values of the communities of interest or community has no capacity to adapt and cope with change. |
||
Legend: |
Low Social Impact or Opportunity |
Medium Social Impact or Opportunity |
High Social Impact or Opportunity |
|||
Likelihood of Occurring |
Likely to occur of the technology is slipped into hands of Hackers. |
The race to get hands on technology |
Technology doesn’t guarantee results as it is in development stage |
Privacy invasion on government and other valuable information. |
||
Would occur with widespread use |
Could pose a major threat when used for private purposes. |
|||||
Likely to occur because technology would be expensive |
Technology can easily be accesses by rich terrorist organizations |
|||||
LOW |
||||||
LOW |
Opportunity / Impact / Consequence |
HIGH |
||||
Incidental |
Minor |
Significant |
Major |
Severe |
||
Local, small-scale, easily reversible change on social characteristics or values of the communities of interest or communities can easily adapt or cope with change. Local small-scale opportunities emanating from the project that the community can readily pursue and capitalise on. |
Short-term recoverable changes to social characteristics and values of the communities of interest or community has substantial capacity to adapt and cope with change. Short-term opportunitiesemanating from the project. |
Medium-term recoverable changes to social characteristics and values of the communities of interest or community has some capacity to adapt and cope with change. Medium-term opportunities emanating from the project. |
Long-term recoverable changes to social characteristics and values of the communities of interest or community has limited capacity to adapt and cope with change. Long-term opportunitiesemanating from the project |
Irreversible changes to social characteristics and values of the communities of interest or community has no capacity to adapt and cope with change. |
||
Legend: |
Low Social Impact or Opportunity |
Medium Social Impact or Opportunity |
High Social Impact or Opportunity |
References
Business Insider. 2015. “7 awesome ways quantum computers will change the world.” businessinsider.in. 22 April. Accessed 2017. https://www.businessinsider.in/7-awesome-ways-quantum-computers-will-change-the-world/articleshow/47006938.cms.
Communications of the ACM. 2017. “A Blueprint for Building a Quantum Computer.” cacm.acm.org. Accessed 2017. https://cacm.acm.org/magazines/2013/10/168172-a-blueprint-for-building-a-quantum-computer/fulltext.
cs.ucsb.edu. 017. “quantum computing architecture overview.” cs.ucsb.edu. Accessed 2017. https://www.cs.ucsb.edu/~chong/QC/.
E&T . 2016. The trouble with quantum computing. 8 November. Accessed 2017. https://eandt.theiet.org/content/articles/2016/11/the-trouble-with-quantum-computing/.
Go to the Globe and Mail. 2015. “Quantum computers entice Wall Street vowing higher returns.” theglobeandmail.com. 10 December. Accessed 2017. https://www.theglobeandmail.com/globe-investor/investment-ideas/money-managers-embracing-uncertainty-with-quantum-computing/article27671812/.
Gruska, Jozef. 2017. “QUANTUM COMPUTING.” https://www2.fiit.stuba.sk. Accessed 2017. https://www2.fiit.stuba.sk/~kvasnicka/QuantumComputing/Gruska_QC.pdf.
How Stuff Works. 2017. How Quantum Computers Work. Accessed 2017. https://computer.howstuffworks.com/quantum-computer.htm.
IJSTRM. 2017. A REPORT ON QUANTUM COMPUTING. Accessed 2017. https://giapjournals.com/index.php/ijsrtm/article/view/108.
npj quantum information. 2017. “Building logical qubits in a superconducting quantum computing system.” nature.com. 13 January. Accessed 2017. https://www.nature.com/articles/s41534-016-0004-0.
Plus Magazine. 2017. “How does quantum computing work?” plus.maths.org. Accessed 2017. https://plus.maths.org/content/how-does-quantum-commuting-work.
Ponnath, Abhilash. 2017. “Difficulties in the Implementation of Quantum Computers.” Arxiv.org. Accessed 2017. https://arxiv.org/ftp/cs/papers/0602/0602096.pdf.
Rodney Van Meter, Clare Horsman. 2017. “A Blueprint for Building a Quantum Computer.” Communications of the ACM 56 (10): 84-93.
Sharlow, Daniel. 2017. “Quantum Computing: The Future Computers.” Danielsharlow.wordpress.com. Accessed 2017. https://danielsharlow.wordpress.com/ethics/.
Wired. 2017. Inside the weird world of quantum computers. 23 March. Accessed 2017. https://www.wired.co.uk/article/quantum-computing-explained.
—. 2017. Quantum Computers Versus Hackers, Round One. Fight! Accessed 2017. https://www.wired.com/2017/01/quantum-computers-versus-hackers-round-one-fight/.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download