Media Search:



Where To, Academic Man? – The American Conservative

A good frienda retired professor of science at a prestigious universitydespairingly sent me yet another example of the cancellation of information challenging the woke zeitgeist. The article, which appeared in the influential journal Physics Education Review, claimed that whiteboards collaborate with white organizational culture, where ideas and experiences gain value (become more central) when written down. As if that wasnt ridiculous enough, an even bigger fish, the American Physical Society, not only jumped in to defend the nonsense but stifled contrary opinions put forth by a group of highly credentialed physicists.

It seems that similar outrages occur in academia almost every week. Respected scholars invited to speak on campus are shouted down or chased from the stage by howling packs of indoctrinated students, violent Antifa members are hired to teach at major universities, and highly discriminatory Diversity, Equity, and Inclusion mandates are inserted into the curriculum, governing documents, and job advertisements.

Illustrating how deeply cancel culture has intruded upon valid intellectual exploration, an anonymous anthropology Ph.D. who goes by the internet pseudonym Stone Age Herbalist recently wrote in a widely circulated UnHerd article:

What seems obvious to the general public that prehistory was a bloody mess of invasions, migrations, battles and conflict is not always a commonplace view among researchers. Worse, the idea that ancient peoples organized themselves among clear ethnic and tribal lines is also taboo. Obvious statements of common sense, such as the existence of patriarchy in the past, are constantly challenged and the general tone of academia is one of refutation: both of established theories and thinkers and of disagreeable parts of the past itself.

His lament suggests that the emerging consensus among academic anthropologists has become preposterous. Everything we know about primitive people, both long dead and alive today, indicates that the sort of social organization describedethnic, tribal, and patriarchalis pretty much universal. Yet that apparent verity conflicts with the majority views in todays anthropology departments; in some, such observations cannot even be expressed, let alone defended.

Such thinking sounds the death knell for truth and knowledgeand yet it prevails throughout much of academia. My friends despair was hardly irrational. Yet Sauron has not completely won the whole of Middle Earth. Some hearty contrarian academics still remain, and many of their colleagues, who personally lean to the left, still support an open exchange of ideas. Perhaps more important, small bastions of conservative thought have appeared in the last couple of decades, both inside and outside the academy.

Inside, independent academic centers and institutes that receive outside funding but are still part of the university have, with a few exceptions, proven to be both resilient and effective as far as providing post-doctoral employment for newly minted conservative Ph.D.s until they can find more permanent positions. In part because of these centers, every new conservative Ph.D. of my acquaintance has found appropriate intellectual work, mostly in academia.

Another very hopeful development is a new spirit of engagement with academia by conservative state politicians. Until recently, even in solidly red states, Republican politicians gave wide latitude to public university systems to run their own affairs. In doing so, they turned a blind eye to intellectual realities, and those institutions responded by becoming woke and allying themselves with politicians on the left. Lately, however, there has been serious pushback. For instance, as of May 1, twenty state legislatures have proposed bills disallowing or limiting the use of DEI political litmus tests in the state university systems.

Additionally, some states are restoring the spirit of the open exchange of ideas on their public campuses by mandating debates or discussions featuring multiple perspectives on controversial topics. Florida recently passed a bill that requires public universities to create an Office of Public Policy Events to hold large-scale discussions or debates on major issues on campus. North Carolina has already created a Public Discourse Program for the same purpose at its flagship campus at Chapel Hill and may do something similar for its entire university system.

As promising as these developments are, it is unlikely the academy will become a completely open forum any time soon. Even in a best-case scenario, opinions will not be allowed to stray too far from established norms. There has been too much censorship for too long, too much social disapprobation, with too many factions poised to disrupt events whenever the discussion veers outside the narrow boundaries of their approval.

Furthermore, conservative efforts to date have done little to confront the deep-seated bias in departments, administrations, academic journals, and research funding agencies, where the worst silencing goes on. As the saying goes, personnel is policy, and new hiring continues to move faculty and related staff further into cancel culture. The left will find other means than statements of agreement with DEI principles to winnow out non-conforming jobseekers, and it may take more than a few laws protecting free speech to change the real dialogue on most campuses.

But even if the momentum against openness to differing views continues in the academy, there is growing activity outside the protective walls of the Ivory Tower. Another institution vies to be the leader in public discussion: the internet.

Important ideas are increasingly likely to be introduced on the websites of think tanks or web-based media publications rather than in academic journals. Still, these publications must remain within a certain range of perspectives or face cancellation techniques such as the loss of access to social media.

Most people are familiar with highly visible dissenters who have left tenured academic positions, such as former Evergreen State College biologist Brett Weinstein or former University of Toronto psychologist Jordan Peterson, both of whom now thrive on the internet. But there are some academicssome still working inside the academywhose work goes far beyond current conventions. The above-cited Stone Age Herbalist is one, and he describes how serious scholarship in his field now takes place in a sort of intellectual underground:

For or many of us, anonymity has allowed us to pursue our passion for scholarly research in a way that is simply impossible within the censorious confines of modern academia. And so, in these hidden places, professional geneticists, bio-archaeologists and physical anthropologists have created a network of counter-research. Using home-made software, spreadsheets and private servers, detailed and rigorous work is conducted away from prying eyes and hectoring voices.

The internet has made it possible for even the most unique scholars to promote their ideas to the broader public. Another anonymous internet intellectualthe outrageous Bronze Age Pervertself-published a book (Bronze Age Mindset) in 2018 that burst through the barrier that separates the wishful world of self-published writers and the lucrative world of celebrated authors. To many younger scholars in academia, tired of the boundaries imposed on them, his book was seen as intriguingif not thrilling. To more established intellectuals, it was seen as ill-conceived and threatening, although more than a few found it worthy of real analysis.

With so many new entrants into the world of ideas outside of traditional sources, academias stranglehold on the national discourse may be broken, and the Ivory Tower itself may be forced to open up. But that is only if the current freedom to exchange ideas continues. What the future brings is anybodys guess; the future of the intellectual life of the nation comes down to a question of power: Who controls the dialogue?

Read more from the original source:
Where To, Academic Man? - The American Conservative

Cyberwarfare: How the IDF safeguards strategic assets in the digital … – Ynetnews

The artificial intelligence craze sweeping the planet has not skipped intelligence and defense systems, especially since the Israel Defense Forces and many other western militaries have been utilizing it for years - but it's the leap in generative AI that is noteworthy.

How quickly has every child been able to transform himself into a professional painter, author and even hacker, is a phenomenon that we all need to take a pause for and be mindful of, as it exemplifies how quickly forceful technology has made the shift from obscure laboratories, hidden from public view, to the every child's bedroom.

3 View gallery

The IDF is spearheading cyberwarfare

(Photo: Dana Koppel)

Take quantum computing, for instance.

The crumbling of cipher keys has become every security system's biggest nightmare scenario for 2023. We're talking about a situation in which internal communications, computer networks and operational documents become publicly exposed, which will surely signal an unprecedented security breach.

As far as Israel goes, it was in 1997, when the Ansariya ambush, in which a unit from the Israeli Navys special operation unit, Shayetet 13, on a mission in South Lebanon, stumbled into a deadly ambush by Islamic Resistance guerrillas, leaving 12 operatives dead.

While in a civilian context the day-to-day war of attrition against hackers is conducted in the name of protecting private clients and patents, in the military realm, it is about protecting a country's strategic assets.

In a more narrowly defined Israeli context, it means protecting the Iron Dome missile defense system, the digital emergency alarm array and operational details ingrained in top secret IDF plans.

Cyberwarfare is divided between military intelligence and C4I corps, the IDF's elite technological unit. The Cyber Defense Brigade was established six years ago, and the most intriguing component of that brigade is the Center of Encryption and Information Security.

That's where ciphers and codes are developed, serving the IDF, Shin Bet, Mossad and many other governmental bodies.

The Center of Encryption and Information Security officials say that the most convenient part of cyber is dealing with what's known and familiar. The future, on the other hand, gets trickier to deal with, and that entails quantum computing.

It is a rather advanced processing method, based on observations made in quantum mechanics. "Quantum computers will be able to instantaneously perform tasks that today's computers would require at least a millennia. They would easily crack today's ciphers," a lieutenant colonel from the unit says.

"When you currently connect to your bank account, work, email or WhatsApp, various components ensure the security of your access. One crucial element is an algorithm called RSA, which relies on intricate mathematical problems," he says.

3 View gallery

IBM's quantum computer at an exhibition in Germany

(Photo: Shutterstock)

"While these problems can theoretically be solved, they are notoriously complex and time-consuming, even for supercomputers. However, with the advent of quantum computers, RSA encryption could be defeated within seconds.

"This implies that hackers or adversaries would possess nearly limitless computing power to decrypt traditional ciphers. Consequently, sensitive and encrypted data could be compromised today, with the potential to decrypt it once a quantum computer of sufficient strength becomes accessible," the lieutenant colonel explains.

Could this danger materialize tomorrow? "That would depend on your definition of tomorrow. Major technology companies are already demonstrating remarkable advancements in this domain, with estimates suggesting that they will develop a stable and dependable quantum computer within the next five to 10 years.

"From the perspective of the IDF, this timeline is alarmingly brief. We consider it highly likely that within the coming decade, quantum computers will fall into the hands of entities interested in accessing the IDF's classified information. Consequently, we have been diligently studying this subject since the mid-2000s."

"Keep in mind, this is uncharted territory," says a major in the unit. "Here, we do not rely on pre-existing textbooks or established foundations. We are tasked with starting from scratch, immersing ourselves in comprehensive self-learning and research. What's more, we take on the responsibility of developing our own curriculum and training individuals from the ground up."

Aside from its computational applications, quantum technology has the kind of applications that could rival an episode of "Star Trek." Many of these advancements are poised to have a profound impact on the military system, with some already being partially realized.

An example of this can be observed in the use of Lidar technology, which employs quantum sensors for laser-based object mapping. It is already integrated into autonomous vehicles, smartphones and is instrumental in generating highly detailed maps.

Quantum sensors will also enable remarkably precise navigation, independent of GPS satellites or similar systems. Furthermore, quantum communication promises stable and secure connections over considerable distances, often spanning dozens of miles.

3 View gallery

Cyberwarfare could soon replace traditional battlefields

(Photo: Courtesy)

But with many of those serving in these specialized cyber units ranging from 18 to 30 years of age, it raises the question: How would a bunch of kids solve problems that the planet's finest minds are still struggling with?

The lieutenant colonel is optimistic about that. "First, and this may sound trite, I firmly believe in the exceptionalism of the 'Jewish mind,' particularly in the realm of mathematics. Since its inception, the proportion of graduates from the mathematical field who have gone on to become esteemed doctors and professors in academia is remarkable.

"Second, the IDF possesses a unique advantage in its ability to bring together the brightest minds in one place, all working toward solving the same problems. Unlike academia, where minds are dispersed and lack a unified mission, the IDF provides a concrete operational context for our missions.

"Moreover, we receive continuous support from reserve personnel and external consultants who have successfully passed through rigorous security clearance protocols. The IDF benefits from a wealth of research knowledge accumulated over decades."

How do you research quantum computing with a quantum computer? "The research we conduct is based on algorithms and, in theory, it can be performed since we understand the behavior involved. However, it's evident that for demonstration and testing purposes, a quantum computer is necessary, which is currently unavailable in Israel.

"To overcome this limitation, we rely on quantum computing services provided by prominent international software giants through the cloud. We make use of these services extensively for our research endeavors."

Original post:
Cyberwarfare: How the IDF safeguards strategic assets in the digital ... - Ynetnews

Big 12 football recruiting: 14 thoughts on 14 teams as summer visits begin – The Athletic

The recruiting trail is about to heat up with summer official visits set to begin in earnest this weekend. Heres one thought on the 2024 class of each Big 12 program before the pot gets boiling.

National rank: 45 Number of commits: 5 Average player rating: 86.32

The Bears have understandably hit the home state hard, with four of the five commitments coming from Texas thus far. But Baylor is also hoping to dip into Arizona for three-star tight end Dillon Hipp. The 6-foot-6, 240-pound prospect and top tight end in the state has a busy June with four official visits: Ole Miss, Arizona State, TCU and Baylor. Fortunately for the Bears, theyre batting cleanup, with Hipp slated to visit Waco on June 23.

National rank: 63 Number of commits: 4 Average player rating: 84.71

The Cougars are working hard to land a quarterback in the 2024 class. BYU missed out on four-star prospect Isaac Wilson to in-state rival Utah, which stung even worse considering hes the younger brother of former BYU star Zach Wilson. Regardless, Kalani Sitake and his staff have a couple more irons in the fire, including three-star Carson Suesue, who made an unofficial visit in March and will transfer to Granger High School in Salt Lake City for his senior year. The Cougars are also pursuing unrated Enoch Watson, the younger brother of incoming BYU linebacker Pierson Watson.

National rank: 21 Number of commits: 9 Average player rating: 87.13

Can the Bearcats maintain their white-hot start to the 2024 recruiting cycle? Despite being the only team in the league to undergo a coaching change this offseason, the Big 12 newcomers currently have a top-25 class that ranks second in the conference. Thats partially a result of already having nine commits, headlined by four-star, top-300 linebacker Qua Birdsong. The rankings will change drastically between now and the early signing period, but it will be interesting to see what else the Bearcats can add this summer and where they wind up in the league pecking order. One of Cincinnatis top remaining targets is four-star quarterback Samaj Jones out of Philadelphia, who has visits scheduled with West Virginia, Cincinnati and Oklahoma in June.

National rank: 90 Number of commits: 1 Average player rating: 84.52

Are we going to see a P5 recruiting bump for the Coogs? Houston currently has the 90th-ranked class nationally dead last in the new Big 12 with only one commit. The Cougars have long had to battle the Group of 5 stigma while recruiting against power-conference foes in one of the most talent-rich states in the country. It will take some time to roll back that ocean, but Houston fans were probably hoping for a quicker impact and faster start on the trail following a disappointing season in 2022. The program needs to come out of the summer visit sessions with some notable progress.

National rank: 31 Number of commits: 7 Average player rating: 85.83

Matt Campbell is getting back to his old development ways. The Cyclones arent completely shying away from bigger swings, including four-star wideout Witt Edwards, who is scheduled to visit in June, and battles with Oklahoma for tight end Cooper Alexander and running back Xavier Robinson. But they are also targeting less-heralded prospects such as in-state receiver Reece Vander Zee, Florida wideout Shamar Rigby, Illinois linebacker Cael Brezina and Brent and Wade Helton, twin offensive linemen out of California. All are expected to make official visits to Iowa State in June.

National rank: 54 Number of commits: 5 Average player rating: 86.62

A few months after Jayhawks defensive backs coach Jordan Peterson scored a commitment from cornerback Jacoby Davis out of Houston just before national signing day, Peterson is continuing to flex his recruiting muscles. He helped Kansas earn a top-four spot for three-star edge rusher Deshawn Warner out of the Phoenix area, and already got a commitment from three-star cornerback Aundre Gibson, Warners teammate and cousin. Peterson is also dipping back into Texas to pursue high-end three-star defensive back Rodney Bimage, who has a 247Sports crystal ball to Texas A&M but will visit Lawrence on June 15.

National rank: 34 Number of commits: 6 Average player rating: 87.25

The vibes are good in Manhattan. The Wildcats are fresh off a 2022 conference championship and locked up head coach Chris Klieman with an eight-year extension this offseason. So theres little sense of panic as Kansas State eases into the 2024 class, although a shuttered airport wont help matters this summer. With a handful of offensive commits in tow, the Wildcats are targeting a pair of high-end three-star edge rushers in Caleb Redd and Wyatt Gilmore, with Redd slated to visit in late June.

National rank: 28 Number of commits: 6 Average player rating: 91.01

Brent Venables caught his share of flack for a slow start to the 2023 recruiting cycle, and all he had to show for it in the end was a top-four class, according to the 247Sports Composite. The Sooners are already off to a solid start in 2024, and despite recently losing four-star, in-state defensive lineman Xadavien Sims to Oregon, they have a stacked list of defensive targets on the radar. Oklahoma appears to be in the drivers seat for five-star defensive lineman Williams Nwaneri, No. 3 overall in the 2024 class, and is pursuing a few other five-star, top-10 recruits in defensive lineman and Oklahoma native David Stone and linebacker Sammy Brown. All three are expected to be in Norman for official visits June 16-18.

GO DEEPER

Wasserman: How a visit with Brent Venables changed my view on Oklahoma's 'no-visit' policy

National rank: 35 Number of commits: 6 Average player rating: 87.09

After a rocky end to the 2022 season and considerable talent drain via the transfer portal this offseason, the Pokes could use a strong haul in the 2024 class. Oklahoma State is currently ranked a very respectable 35th overall, but like BYU, also missed out on Wilson, the four-star quarterback who committed to Utah. In better news, the Cowboys were in early on promising three-star offensive lineman Ory Williams, who visited in April, and appear to be in good position on three-star safety David Kabongo, who has set a commitment date for June 12 with an official visit scheduled in Stillwater a couple of days later.

GO DEEPER

Why TCU hit a five-star home run with three-star QB prospect Hauss Hejny

National rank: 50 Number of commits: 4 Average player rating: 88.14

Expectations are soaring for the Horned Frogs coming off a left-field run to the national title game, and TCU is hoping to capitalize on that momentum while also replenishing a ton of lost production. How soon (and significantly) will the boost in profile show up in recruiting? The Frogs made the top five for four-star safety Jordon Johnson-Rubell, a Fort Worth native playing for IMG (Fla.) Academy. The good news for TCU is that it has a hometown advantage, and Johnson-Rubell is slated for an official visit on June 8. The bad news is the Frogs are competing with Ohio State, Michigan, Texas and USC. This will be a tough one to win, but seeing TCU in more of these blue-chip battles is an encouraging step.

National rank: 64 Number of commits: 3 Average player rating: 88.40

A year removed from signing 18 total blue-chip prospects in the 2023 class which was ranked third overall and headlined by five-star quarterback Arch Manning the Longhorns have just three commits and only one four-star in the 2024 class thus far. But things are set to ratchet up in a big way, particularly June 23-25. Texas is expected to host at least a dozen priority targets that weekend, including four-star offensive lineman Daniel Calhoun; in-state cornerbacks Kobe Black (five-star) and Selman Bridges (four-star); four-star running back Jerrick Gibson; and five-star, in-state edge rusher Colin Simmons, a top-five overall recruit. The Longhorns are hovering in the mid-60s of the national rankings and toward the bottom of the conference, but thats sure to look considerably different entering July.

National rank: 19 Number of commits: 9 Average player rating: 88.21

Head coach Joey McGuire has the Red Raiders cooking again on the recruiting trail as he enters his second season, currently with a top-20 national ranking in the 2024 class. Of Techs nine commitments thus far, three are top-500 prospects, including four-star edge Cheta Ofili and three-star QB Will Hammond. The Red Raiders are also heavily in the mix for five-star, in-state receiver Micah Hudson, currently rated the seventh-best prospect in the 2024 class. He has an official visit scheduled to Lubbock on June 9, when Tech will look to make a strong impression ahead of his visit to the Longhorns later that month.

National rank: 51 Number of commits: 4 Average player rating: 88.05

Top-500 defensive lineman Sincere Edwards is currently the highest-rated commit of UCFs 2024 class. The Orlando native has been committed to his hometown school since last August, but it will be interesting to see if the Knights can hold on to him as his interest continues to grow. Edwards took an unofficial visit to Pitt in April that clearly resonated (with an assist from Aaron Donald) and announced he would be back for an official visit in late June. He remains committed to UCF and has an OV June 9, and getting him to campus wont be a problem. But the sharks are circling.

National rank: 69 Number of commits: 3 Average player rating: 85.56

The Mountaineers are bringing up the rear of the current recruiting rankings among the leagues incumbent members, but they do seem to have some things in the works. Theyre locked in a battle with old rival and new conference foe Cincinnati for Jones, the four-star quarterback out of Philadelphia. WVU might have the advantage, too: Jones is slated to visit this weekend along with high-end three-star wide receiver and high school teammate Brandon Rehmann, with whom the Mountaineers appear to be in a good spot.

(Photo of Steve Sarkisian: Scott Wachter / USA Today)

See the article here:
Big 12 football recruiting: 14 thoughts on 14 teams as summer visits begin - The Athletic

The 5 Most Promising AI Hardware Technologies – MUO – MakeUseOf

Artificial Intelligence (AI) has made remarkable advancements since the end of 2022. Increasingly sophisticated AI-based software applications are revolutionizing various sectors by providing inventive solutions. From seamless customer service chatbots to stunning visual generators, AI is enhancing our daily experiences. However, behind the scenes, AI hardware is pivotal in fueling these intelligent systems.

AI hardware refers to specialized computer hardware designed to perform AI-related tasks efficiently. This includes specific chips and integrated circuits that offer faster processing and energy-saving capabilities. In addition, they provide the necessary infrastructure to execute AI algorithms and models effectively.

The role of AI hardware in machine learning is crucial as it aids in the execution of complex programs for deep learning models. Furthermore, compared to conventional computer hardware like central processing units (CPUs), AI hardware can accelerate numerous processes, significantly reducing the time and cost required for algorithm training and execution.

Furthermore, with the growing popularity of AI and machine learning models, there has been an increased demand for acceleration solutions. As a result, companies like Nvidia, the world's leading GPU manufacturer, have witnessed substantial growth. In June 2023, The Washington Post reported that Nvidia's market value surpassed $1 trillion, surpassing the worth of Tesla and Meta. Nvidia's success highlights the significance of AI hardware in today's technology landscape.

If you're familiar with what edge computing is, you likely have some understanding of edge computing chips. These specialized processors are designed specifically to run AI models at the network's edge. With edge computing chips, users can process data and perform crucial analytical operations directly at the source of the data, eliminating the need for data transmission to centralized systems.

The applications for edge computing chips are diverse and extensive. They find utility in self-driving cars, facial recognition systems, smart cameras, drones, portable medical devices, and other real-time decision-making scenarios.

The advantages of edge computing chips are significant. Firstly, they greatly reduce latency by processing data near its source, enhancing the overall performance of AI ecosystems. Additionally, edge computing enhances security by minimizing the amount of data that needs to be transmitted to the cloud.

Here are some of the leading manufacturers of AI hardware in the field of edge computing chips:

Some might wonder, "What is quantum computing, and is it even real?" Quantum computing is indeed a real and advanced computing system that operates based on the principles of quantum mechanics. While classical computers use bits, quantum computing utilizes quantum bits (qubits) to perform computations. These qubits enable quantum computing systems to process large datasets more efficiently, making them highly suitable for AI, machine learning, and deep learning models.

The applications of quantum hardware have the potential to revolutionize AI algorithms. For example, in drug discovery, quantum hardware can simulate the behavior of molecules, aiding researchers in accurately identifying new drugs. Similarly, in material science, it can contribute to climate change predictions. The financial sector can benefit from quantum hardware by developing price prediction tools.

Below are the significant benefits of quantum computing for AI:

Application Specific Integrated Circuits (ASICs) are designed for targeted tasks like image processing and speech recognition (though you may have heard about ASICs through cryptocurrency mining). Their purpose is to accelerate AI procedures to meet the specific needs of your business, providing an efficient infrastructure that enhances overall speed within the ecosystem.

ASICs are cost-effective compared to traditional central processing units (CPUs) or graphics processing units (GPUs). This is due to their power efficiency and superior task performance, surpassing CPUs and GPUs. As a result, ASICs facilitate AI algorithms across various applications.

These integrated circuits can handle substantial volumes of data, making them instrumental in training artificial intelligence models. Their applications extend to diverse fields, including natural language processing of texts and speech data. Furthermore, they simplify the deployment of complex machine-learning mechanisms.

Neuromorphic hardware represents a significant advancement in computer hardware technology, aiming to mimic the functioning of the human brain. This innovative hardware emulates the human nervous system and adopts a neural network infrastructure, operating with a bottom-up approach. The network comprises interconnected processors, referred to as neurons.

In contrast to traditional computing hardware that processes data sequentially, neuromorphic hardware excels at parallel processing. This parallel processing capability enables the network to simultaneously execute multiple tasks, resulting in improved speed and energy efficiency.

Furthermore, neuromorphic hardware offers several other compelling advantages. It can be trained with extensive datasets, making it suitable for a wide range of applications, including image detection, speech recognition, and natural language processing. Additionally, the accuracy of neuromorphic hardware is remarkable, as it rapidly learns from vast amounts of data.

Here are some of the most notable neuromorphic computing applications:

A Field Programmable Gate Array (FPGA) is an advanced integrated circuit that offers valuable benefits for implementing AI software. These specialized chips can be customized and programmed to meet the specific requirements of the AI ecosystem, earning them the name "field-programmable."

FPGAs consist of configurable logic blocks (CLBs) that are interconnected and programmable. This inherent flexibility allows for a wide range of applications in the field of AI. In addition, these chips can be programmed to handle operations of varying complexity levels, adapting to the system's specific needs.

Operating like a read-only memory chip but with a higher gate capacity, FPGAs offer the advantage of re-programmability. This means they can be programmed multiple times, allowing for adjustments and scalability per the evolving requirements. Furthermore, FPGAs are more efficient than traditional computing hardware, offering a robust and cost-effective architecture for AI applications.

In addition to their customization and performance advantages, FPGAs also provide enhanced security measures. Their complete architecture ensures robust protection, making them reliable for secure AI implementations.

AI hardware is on the cusp of transformative advancements. Evolving AI applications demand specialized systems to meet computational needs. Innovations in processors, accelerators, and neuromorphic chips prioritize efficiency, speed, energy savings, and parallel computing. Integrating AI hardware into edge and IoT devices enables on-device processing, reduced latency, and enhanced privacy. Convergence with quantum computing and neuromorphic engineering unlocks the potential for exponential power and human-like learning.

The future of AI hardware holds the promise of powerful, efficient, and specialized computing systems that will revolutionize industries and reshape our interactions with intelligent technologies.

Originally posted here:
The 5 Most Promising AI Hardware Technologies - MUO - MakeUseOf

Quantum computing: The five biggest breakthroughs – Engineers Ireland

Quantum computing is a revolutionary technology already making waves in many industries, such as drug discovery, cryptography, finance, and logistics. It works by exploiting quantum mechanical phenomena to perform complex computations in a fraction of the time classical computers require. Two main quantum mechanical phenomena drive quantum computers' speed and computational prowess superposition and entanglement.

Unlike classical computers, which operate on binary bits (0 and 1), quantum computers operate on quantum bits or qubits. Qubits can exist in a state of superposition. This means that any qubit has some probability of existing simultaneously in the 0 and 1 states, exponentially increasing the computational power of quantum computers.

Another unique property that qubits have is their ability to become entangled. This means that two qubits, no matter how physically far, are correlated so that knowing the state of one particle automatically tells us something about its companion, even when they are far apart. This correlation can be harnessed for processing vast amounts of data and solving complex problems that classical computers cannot.

Classical computers only have the power to simulate phenomena based on classical physics, making it more difficult or slower to solve problems that rely on quantum phenomena. This is where the true importance of quantum computers lies.

Since quantum computers are based on qubits, they can solve challenging problems using classical computers and revolutionise many industries. For example, quantum computers can rapidly simulate molecules and chemical reactions, discovering new drugs and materials with exceptional properties.

Although significant breakthroughs have been made in quantum computing, we are still in the nascent stages of its development.

The objective of quantum supremacy is to demonstrate that a quantum computer can solve a problem that no classical computer can solve in any reasonable length of time, despite the usefulness of the problem. Achieving this goal demonstrates the power of a quantum computer over a classical computer in complex problem-solving.

InOctober 2019, Google confirmedthat it had achieved quantum supremacy using its fully programmable 54-qubit processor called Sycamore. They solved a sampling problem in 200 seconds which would take a supercomputer nearly 10,000 years to solve. This marked a significant achievement in the development of quantum computing.

Richard Feynman first theorised the idea of using quantum mechanics to perform calculations impossible for classical computers. Image:Unknown/Wikimedia Commons

Since then, many researchers have demonstrated quantum supremacy by solving various sampling problems. The impact of achieving quantum supremacy cannot be overstated. It validates the potential of quantum computing to solve problems beyond the capabilities of classical computers, as first theorised by Richard Feynman in the 1980s.

Apart from sampling problems, other applications have been proposed for demonstrating quantum supremacy, such as Shor's algorithm for factoring integers which are extremely important in encryption. However, implementing Shor's algorithm for large numbers is not feasible with existing technology and is hence not the preferred oversampling algorithm for demonstrating supremacy.

The most pressing concern with quantum computers is their sensitivity to errors induced by environmental noise and imperfect control. This hinders their practical usability, as data stored on a quantum computer can become corrupted.

Classical error correction relies on redundancy, ie, repetition. However, quantum information cannot be cloned or copied due to the no-cloning theorem (which states thatit is impossible to create an independent and identical copy of an arbitrary unknownquantum state). Therefore, a new error correction method is required for quantum computing systems.

QEC for a single qubit. Image:Self/Wikimedia Commons

Quantum error correction (QEC) is a way to mitigate these errors and ensure that the data stored on a quantum computer is error-free, thus improving the reliability and accuracy of quantum computers.

The principle of QEC is to encode the data stored on a quantum computer such that the errors can be detected and corrected without disrupting the computation being performed on it.

This is done using quantum error-correction codes (QECCs). QECCs work by encoding the information onto a larger state space. They further correct the error without measuring the quantum state, thereby preventing the collapse of the quantum state.

The first experimental demonstration of QEC was done in 1998with nuclear magnetic resonance qubits. Since then, several experiments to demonstrate QEC have been performed using, for example, linear optics and trapped ions, among others.

A significant breakthrough camein 2016 when researchers extended the lifespan of a quantum bit using QEC. Their research showed the advantage of using hardware-efficient qubit encoding over traditional QEC methods for improving the lifetime of a qubit.

The detection and elimination of errors is critical to developing realistic quantum computers. QEC handles errors in the stored quantum information, but what about the errors after performing operations? Is there a way to correct those errors and ensure that the computations are not useless?

Fault-tolerant quantum computing is a method to ensure that these errors are detected and corrected using a combination of QECCs and fault-tolerant gates. This ensures that errors arising during the computations don't accumulate and render them worthless.

Quantum computing features. Image:Akash Sain/iStock

The biggest challenge in achieving fault-tolerant quantum computing is the need for many qubits. QECCs themselves require a lot of qubits to detect and correct errors.

Additionally, fault-tolerant gates also require a large number of qubits. However, two independent theoretical studies published in1998and2008proved that fault-tolerant quantum computers can be built. This has come to be known as the threshold theorem, which states that if the physical error rates of a quantum computer are below a certain threshold, the logical error rate can be suppressed to arbitrarily low values.

No experimental findings have proven fault-tolerant quantum computing due to the high number of qubits needed. The closest we've come to an experimental realisation is a2022 study published in Nature,demonstrating fault-tolerant universal quantum gate operations.

We have seen teleportation one too many times in science fiction movies and TV shows. But are any researchers close to making it a reality? Well, yes and no. Quantum teleportation allows for transferring one quantum state from one physical location to another without physically moving the quantum state itself. It has a wide range of applications, from secure quantum communication to distributed quantum computing.

Quantum teleportation wasfirst investigated in 1993by scientists who were using it as a way to send and receive quantum information. It was experimentally realised only four years later, in 1997, by two independent research groups. The basic principle behind quantum teleportation is entanglement (when two particles remain connected even when separated by vast distances).

Since 1997, many research groups have demonstrated the quantum teleportation of photons, atoms, and other quantum particles. It is the only real form of teleportation that exists.

In fact, the 2022 Nobel Prize in Physics was awarded to three scientists Alain Aspect, John Clauser, and Anton Zeilinger for experiments with entangled photons. The work demonstrated that teleportation between photons was possible. Their work demonstrated quantum entanglement and showed it could be used to teleport quantum information from one photon to another.

Quantum teleportation is the cornerstone for building a quantum internet. This is because it enables the distribution of entanglement over long distances.

Another important application of quantum teleportation is enabling remote quantum operations, meaning that a quantum computation can be performed on a distant processor without transmitting the qubits. This could be useful for secure communication and for performing quantum computations in inaccessible or hostile environments.

Topology is a branch of mathematics concerned with studying the properties of shapes and spaces preserved when deformed. But what does it have to do with quantum computing?

In essence, topological quantum computing is a theoretical model that uses quasiparticles called anyons (quasiparticles in two-dimensional space) for encoding and manipulating qubits.

The method is founded on the topological properties of matter, and in the case of anyons, the world lines (the path that an object traces in four-dimensional spacetime) of these particles form braids. These braids then make up the logic gates which are the building blocks of computers.

No experimental studies demonstrate topological quantum computing. Image:FMNLab/Wikimedia Commons

Topological qubits are protected against local perturbations and can be manipulated with high precision, making them less susceptible to decoherence. Additionally, topological quantum computing is more resistant to errors due to its inherent redundancy and topological protection, making it a promising candidate for fault-tolerant quantum computing.

Most topological quantum computing research is theoretical; currently, no studies provide substantial experimental support for the same. But, developments in this area of research are vital for building practical and scalable quantum computers.

With a mix of theoretical and experimental demonstrations, quantum computing is still in the early stages of research and development. These developments can potentially revolutionise several industries and academic disciplines, including financial services, materials science, cryptography, and artificial intelligence.

Even if there is still more study, the implications for quantum computing's future are promising. We may anticipate further developments and innovations in the years to come.

Continued here:
Quantum computing: The five biggest breakthroughs - Engineers Ireland