This page serves as a dynamic resource for OODA Network members looking for Quantum Computing, Quantum Security and Quantum Sensing insights to drive their decision-making process.

OODA Loop Analysis

The Quantum List: Companies leveraging quantum effects for real world functionality and security

The principals at OODA have tracked the science and technology of quantum technologies for decades, including closely watching the emergence of commercial firms leveraging quantum effects for security, communications and sensing. We closely track the transition of R&D into real companies that can deliver solutions based on quantum effects and provide a short list of companies that do so on this page.  The Quantum List those we believe are poised to have an impact on the economy, including firms that deliver capabilities in Quantum Computing, Quantum Security, Quantum Communications and Quantum Sensing. Companies we track on the list include: IBM, Google, Microsoft, D-Wave, OQC, Cold Quanta, IonQ, Rigetti Computing, Quantinuum, QuSecure, Quantum Xchange, QuintessenceLabs, Crypto Quantique, ID Quantique, QWERZ, SandboxAQ, Argit, Strange Works, Zapata, The Entanglement Institute, TerraQuantum, PsiQuantum, Xanadu.

The Executive’s Guide To Quantum Computing

What business decision-makers need to know now about quantum superiority. This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal: inform you about the near future so you can make the right changes to your strategy today.

Updated Executive’s Guide To Quantum Safe Security: Take these steps to make your enterprise quantum proof

This is an update to our Executive’s Guide to Quantum Safe Security, based on a new round of research that has included interviews of OODA Network experts, technology providers and senior executives in enterprises. Quantum Computers will bring new power to adversaries. But when? And what can you do now to mitigate that threat? This report provides insights that can drive your action today.

Quantum Key Distribution on Land and in Space

Quantum key distribution (QKD) is an exciting application of quantum technologies that has exploded in the past decade.  QKD is used to share encryption keys across an established optical link or network. QKD can be used to generate a secure, shared secret key between two users. This key is then used in an algorithm to encrypt message traffic.  The big advantage QKD offers is that any attempt to read the information stored in the photons would destroy the message and be immediately detected. Quantum cryptography is fundamentally viable today in the laboratory and used in some high-end security applications, like banking and stock trading, that can rely on dedicated short distance physical fibers.

NIST on a CHIP – Driving A Revolution In Measurement Science With Quantum Solutions

A new NIST program makes creative use of quantum technologies to deliver advanced measurement solutions to users in commerce, medicine, defense and academia. This delivery of measurement standards in a chip format is known as NIST on a CHIP (NOAC). The time for leaders to think of how this may change your business model is now.

Expert Practitioner and QuintessenceLabs CEO Vikram Sharma on Quantum Effects and Quantum Security

Vikram Sharma is the CEO of QuintessenceLabs, a company he founded to leverage an understanding of how physics works at the quantum level to address some of the biggest issues in cybersecurity. In this discussion at OODAcon, Vikram provided a high level overview of what years of quantum theory and 1000’s of experiments on the nature of reality tell us about the nature of reality, especially reality when measured at the smallest scale. His insights into the world of quantum mechanics includes a description of some of some very strange observations, which are seen again and again in experiment after experiment.

Quantum Supremacy Is Here: The History Making Quantum Computing News We Have Been Anticipating Has Now Been Reported

Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they could achieve history-making results in the near term. Because of all that we had been producing a series of reports aimed at making you as informed as possible on what breakthrough announcements in quantum computing could mean for your business strategy. This post memorializes a point in history we should all remember, even though it was not a point where a real world use case was performed.

Is Quantum Computing Ushering in an Era of No More Secrets?

Context from OODA’s Matt Devost on the very near future of quantum computing. This is clearly an area where focused due diligence is required, both for how data is being stored and secured today and how enterprises should be preparing for an age of no more secrets.


Additional Research:

What To Do About Quantum Uncertainty: Guess what, besides uncertainty at a quantum level there is great uncertainty among business and policy makers regarding Quantum Computing.

AI, quantum computing and 5G could make criminals more dangerous than ever, warn police: Quantum is one of many emerging technologies that law enforcement professionals are tracking

Intel offers AI breakthrough in quantum computing: This article is more about quantum simulations for AI, but shows the ecosystem that is developing around the technology

Quantum Computing That Can Crack Modern Encryption More Than a Decade Away: When we see reports like this we wonder what qualifies the experts to say this. But in this case the experts are the National Academies of Sciences.

Could quantum computers render current bitcoin and most blockchain cryptography powerless?: There is a worry that new algorithms that could run on quantum computing could attack blockchain and asymmetric encryption.