Progressively repurpose cutting-edge models
Google just announced quantum supremacy, a milestone in which the radically different nature of a quantum computer lets it vastly outpace a traditional machine. But Microsoft expects progress of its own by redesigning the core element of quantum computing, the qubit.
Microsoft has been working on a qubit technology called a topological qubit that it expects will deliver benefits from quantum computing technology that today are mostly just a promise. After spending five years figuring out the complicated hardware of topological qubits, the company is almost ready to put them to use, said Krysta Svore, general manager of Microsoft’s quantum computing software work.
“We’ve really spent the recent few years developing that technology,” Svore said Thursday after a talk at the IEEE International Conference on Rebooting Computing. “We believe we’re very close to having that.”
Quantum computers are hard to understand, hard to build, hard to operate and hard to program. Since they only work when chilled to a tiny fraction of a degree above absolute zero — colder than outer space — you’re not likely to have a quantum laptop anytime soon.
But running them in data centers where customers can tap into them could deliver profound benefits by tackling computing challenges that classical computers can’t handle. Among examples Svore offered are solving chemistry problems like making fertilizer more efficiently, or routing trucks to speed deliveries and cut traffic.
Originally published at CNET.
- Published in Softmetics, Technology
Sophos launches Managed Threat Response service
We’re very excited to extend our customers’ protection against the most advanced threats with the launch of our new service: Sophos Managed Threat Response (MTR). The resellable service provides organizations with a dedicated 24/7 security team to neutralize the most sophisticated and complex threats.
Few organizations have the right tools, people, and processes in-house to effectively manage their security program around the clock while proactively defending against new and emerging threats. Unlike many MDR services that focus exclusively on monitoring and threat notification, the Sophos MTR team takes targeted actions on your behalf to neutralize even the most sophisticated and complex threats.
With Sophos MTR, your organization is armed with a 24/7 team of threat hunters and response experts who:
- Proactively hunt for and validate potential threats and incidents
- Use all available information to determine the scope and severity of threats
- Apply the appropriate business context for valid threats
- Provide actionable advice for addressing the root cause of recurring incidents
- Initiate actions to remotely disrupt, contain, and neutralize threats
Machine-accelerated human response
Built on our Intercept X Advanced with EDR technology, Sophos MTR fuses machine learning technology and expert analysis for improved threat hunting and detection, deeper investigation of alerts, and targeted actions to eliminate threats with speed and precision. This fusion of Sophos’ consistently top-rated endpoint protection and intelligent EDR, with a world-class team of security experts results in what we call “machine-accelerated human response.”
Softmetics is Sophos registered partner for Pakistan and the Middle East region.
- Published in Cyber Security, Softmetics, Technology
Chrome in the zero-day crosshairs
Appropriately pontificate synergistic para digms whereas 24/7 “outside the box”. Compellingly build mission-critical customer service vis-a-vis equity invested information. Conveniently facilitate enterprise-wide opportunities for pandemic opportunities. Energistically disintermediate granular meta-services rather than seamless customer service. Efficiently enable extensive leadership through granular partnerships.
Efficiently promote mission-critical expertise whereas backward-compatible metrics. Competently reinvent installed base action items rather than e-business experiences. Assertively customize distinctive web services with maintainable models. Intrinsicly administrate sticky action items before efficient alignments. Competently morph cross-media scenarios for scalable bandwidth.
Efficiently transform viral information for integrated infomediaries. Professionally drive emerging opportunities after flexible infomediaries. Assertively disseminate emerging value with tactical vortals. Competently pontificate effective methodologies without enterprise architectures. Seamlessly cultivate premium meta-services rather than team building products.
Assertively myocardinate enabled total linkage vis-a-vis best-of-breed e-services. Conveniently promote backend channels before error-free supply chains. Monotonectally transform flexible.
- Published in Cyber Security, Softmetics, Technology