article thumbnail

The Quantum Technology Ecosystem – Explained

Steve Blank

Not only would a Universal Quantum Computer running Shor’s algorithm make today’s public key algorithms (used for asymmetric key exchanges and digital signatures) useless, someone can implement a “harvest-now-and-decrypt-later” attack to record encrypted documents now with intent to decrypt them in the future. Quantum Timing.

article thumbnail

Artificial Intelligence and Machine Learning– Explained

Steve Blank

AI applications are already appearing in virtual customer assistants with speech recognition, sentiment analysis, automated/augmented quality assurance and other technologies providing customers with 24/7 self- and assisted-service options across channels. AI in National Security. AI/ML and Ubiquitous Technical Surveillance.

article thumbnail

Top 10 tech trends for 2019

Start Up Blog

They infiltrate the mind by stealth. Social Back Channels Emerge: Robin Dunbar proved many years ago we physically can’t manage close relationships with more than around 50 people, and wider relationships with more than around 150 people. It’s overdue.