Organizations should invest in quantum talent, simulations, and security, according to Dell’s CTO.

Dell And Quantum Computing

Users can utilize quantum computing tools to learn about the technology and begin to master the essential programming languages and logic. John Roese, Dell Technologies Global CTO, has emphasized the four emerging technologies in the industry in preparation for the next quantum breakthroughs and explained how CIOs can act on them right now.

Where we’re starting to see some very long trends culminating with something that needs to be done. it’s not okay to just be aware anymore, there are certain things that you actually have to act on.”

Dell Technologies Global CTO John Roese

Dell Technologies began its journey towards quantum computing in 2016, collaborating with partners such as IonQ and IBM to incorporate quantum computing into current classical computer infrastructure. This strategy differs from other tech titans such as IBM, Google, and Microsoft, which chose to develop their quantum hardware and software.

“In almost every industry, we can find examples where people know what they’re going to use a quantum computer for, and then if they can apply it to these problems, mostly optimization problems, they would get an advantage and they’re starting to experiment.” 

Dell Technologies Global CTO John Roese

And last November, Dell released a hybrid classical-quantum computing package that includes a quantum emulation platform and access to IonQ’s quantum processors, allowing for both on-premise and cloud-based quantum acceleration.

“We have hundreds of examples where people have done the early work to figure out how they would apply quantum mathematics to solve some really hard problems that would make specific industries better.”

Dell Technologies Global CTO John Roese

Understanding Post-Quantum Cryptography

According to Roese, organizations can mitigate the risks by identifying their cryptography inventory, cataloging their crypto assets, and assessing their high-risk public interfaces, including identifying which encrypted data is most exposed to public networks — particularly those in hybrid and multi-cloud environments.

“With the rise of quantum computing comes the need to better understand post-quantum cryptography, the development of cryptographic systems for classical computers that are able to prevent attacks launched by quantum computers,” he warned. “Bad actors globally are actively trying to capture and archive encrypted traffic on the assumption that sufficiently powerful quantum computers will eventually be able to decrypt that data.”

“It turns out that 2023 is the year that for the first time, most enterprises are going to be able to start to deploy quantum-shaped protocols,”

Read more about it here.