• Explore
  • Curator's Pick
  • Login
  • Sign up
stem neoxian hive-130906 stemsocial archon science nature waivio waiv insect natureobserver vyb palnet ecency ctp hive-196387 discovery-it proofofbrain cent space flower hive-111030 photography hiveengine scifiverse hive astronomy technology amazingnature inleo astrophysics art inleo photos spanish astronautics space-conquest stem-espanol pepe poll

#quantum

avatar
@builderofcastles 0
4 days ago
Informationwar
Neils Bohr Won, So Why Don't We Teach Quantum Physics? In the battle between Albert Einstein and Neils Bohr, Bohr and quantum mechanics won, so why do we still teach Einstein's theories? Most people answer this with "because quantum deals wit
24
0
2
0.618 STEM
avatar
@mrosenquist 0
11 months ago
cybersecurity
Impact of Quantum Computing on Encryption
13
0
0
32.759 STEM
avatar
@mrosenquist 0
about 1 year ago
cybersecurity
Quantum Computing and Encryption Future It was absolutely my pleasure being interviewed by Alec Crawford on the AI Risk Reward podcast! Great questions, topics, and a lot of fun! In the full interview we talked…
35
0
0
106.498 STEM
avatar
@vikvitnik 0
9 months ago
Geek Zone
Scientists aim to tackle Alzheimer's and Parkinson's through quantum computing - The ion trap has become the leading alternative to superconducting qubits! Elijah Grimm | Unsplash The contemporary world would not be what it is today without the effo
347
0
3
63.968 STEM
avatar
@danielcarrerag 0
about 1 year ago
Geek Zone
Majorana 1: Are we witnessing the dawn of a new era? Attempting to grasp the incomprehensible [ENG/SPA] The topic of quantum computing is increasingly gaining ground these days, and it's trying to go viral thanks to social media, though without much success, I'd say, due to the…
106
0
0
9.854 STEM
avatar
@vikisecrets 0
11 months ago
Deutsch D-A-CH
Why Bitcoin cryptographic keys (ECDSA) are most probably Quantum Computer-safe Bitcoin verwendet für das Signieren von Transaktionen ein Elliptisches-Kurven-Kryptographie-Verfahren (ECDSA, Elliptic Curve Digital Signature Algorithm), das in der…
160
0
10
54.696 STEM
avatar
@vikisecrets 0
11 months ago
Deutsch D-A-CH
Why Bitcoin Mining (SHA-256) is post Quantum-safe (if Quantum Computer existed) Bitcoin Mining verwendet einen Proof-Of-Work Mining Algorithmus, der auf der SHA-256 Hashfunktion basiert. Miner müssen zu jedem Block einen bestimmten SHA-256 Hash finden, indem…
207
0
12
37.797 STEM
avatar
@blkchn 0
6 months ago
Deutsch D-A-CH
Quanteninternet - ultraschnell und abhörsicher - Quantum Internet - ultra-fast and secure Körber-Preis geht in diesem Jahr an die Physikerin und Informatikerin Stephanie Wehner This year's Körber Prize goes to physicist and computer scientist Stephanie Wehner…
75
0
5
55.731 STEM
avatar
@vikisecrets 0
11 months ago
Deutsch D-A-CH
Quantum computers are not Turing-complete. Nobody really knows how to do useful computations on quantum computers (if they existed) Damit ein Computer nützliche Berechnungen durchführen kann, braucht es nach Alan Turing zwei Dinge: Speicher und die Fähigkeit logische Operationen auf dem Speicher auszuführen…
166
0
7
46.488 STEM
avatar
@vikisecrets 0
10 months ago
Deutsch D-A-CH
D-Wave achieved "Quantum Supremacy" on a material science problem. Hype or real? D-Wave's quantum approach has indeed a lot of potential solving real-world problems (if quantum computers can scale up) Unter "Quantum Supremacy" (Quantum Überlegenheit), das auch etwas abgeschwächt "Quantum Advantage" genannt wird, bezeichnet man den Zustand, ab dem es leistungsstarke…
199
0
8
65.804 STEM
Menu
Explore Curator's Pick
Trade
Trade STEM Swap