To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Quantum sensing, computing, and communication offer some significant improvements on classical technologies, in some cases create fundamentally new capabilities. Quantum technologies are quickly arriving. Even if the most hyped promises in quantum computing are not realized in the next decade, in the near term quantum sensing could shift relationships irrevocably. This book has painted the landscape of quantum's implications---from nation-state concerns of strategic conflict, intelligence gathering, and law enforcement activities; to the concerns of companies that may be subject to industrial policy priorities and restrictions; to the level of the individual who may face institutions with great asymmetries in sensing and sense-making power. This chapter concludes with a forecast of quantum technology scenarios, with forecasts for each quantum technology analyzed in this book, and with a summary of the most important policy issues to pursue.
This chapter uses scenario analysis to seed a policy discussion for quantum technologies. We envision four likely outcomes of the quantum technology race, and these different visions provide motivation for contemplating the strategic, political, and social dimensions of quantum technologies.
This chapter explains two categories of quantum communications technologies: quantum random number generation and quantum networking (or ``quantum internet''). If the quantum networking necessary to achieve the ideal of a quantum internet were achieved, one could likely use the technology to connect disparate, small quantum devices into a larger cluster computer, or connect multiple quantum computers together to create a larger quantum computer. The chapter sets the stage for interest in quantum communications by briefly explaining the rise of signals intelligence (SIGINT) capabilities of governments and the proliferation of these powers to non-governmental actors.
Quantum sensing is the most exciting quantum technology and it has the most potential to change our lives in the next decade and beyond. Quantum sensors will offer new capabilities with benefits for medicine, defense, intelligence, extractive industries and many others. Quantum sensing is a precursor technology to quantum computing and communications. Quantum sensors use quantum properties and effects to measure or sense physical things. This chapter explores quantum sensing as a topic in its own right, because the capabilities of quantum sensing are surprising and offer new forms of knowledge discovery and at new levels of analysis. Furthermore quantum sensors are here today---indeed, they have been in use for more than fifty years.
Introduces Law and Policy for the Quantum Age, with a discussion of the key phenomena needed to understand quantum mechanics: the uncertainty principle, entanglement, and superposition.
The risk of wide-scale cryptanalysis pervades narratives about quantum computing. We argue in this chapter that Feynman's vision for quantum computing will ultimately prevail, despite the discovery of Peter Shor's factoring algorithm that generated excitement about a use of quantum computers that people could understand---and dread. Feynman's vision of quantum devices that simulate complex quantum interactions is more exciting and strategically relevant, yet also more difficult to portray popular descriptions of technology. The Feynman vision for quantum computing will lead to applications that benefit humans in multifarious and unforeseen ways, just like the classical computing revolution improved our lives. Feynman's vision may also enable a ``winner-take-all'' outcome in building a large quantum computer. \par To explain this outcome, we canvass the three primary applications that have been developed for quantum computing: Feynman's vision of simulating quantum mechanical
This appendix situates quantum technologies as a product of the merger of quantum mechanics, the theory of the very small; and information theory, the theory of how information is communicated and quantified. These intersections of these fields create quantum information science (QIS), provide a basis for understanding quantum sensing, computing, and communication. This appendix explains quantum scale and starts an exploration as to why effects at the quantum scale are so radically different from humans' day-to-day experience.
Social media platforms hold vast amounts of data about our lives. Content from the past is increasingly being presented in the form of 'memories'. Critically exploring this new form of memory making, this unique book asks how social media are beginning to change the way we remember.
In recent decades, companies around the world have deployed an arsenal of tools - including IP law, hardware design, software restrictions, pricing strategies, and marketing messages - to prevent consumers from fixing the things they own. While this strategy has enriched companies almost beyond measure, it has taken billions of dollars out of the pockets of consumers and imposed massive environmental costs on the planet. In The Right to Repair, Aaron Perzanowski analyzes the history of repair to show how we've arrived at this moment, when a battle over repair is being waged - largely unnoticed - in courtrooms, legislatures, and administrative agencies. With deft, lucid prose, Perzanowski explains the opaque and complex legal landscape that surrounds the right to repair and shows readers how to fight back.
This chapter introduces the subject matter of the book, provides the core problem statement and defines the central terms used in the book. The introduction also explains the focus on governmental adoption of cloud computing services, legal sources, and the research approach.
The introduction explains how cloud computing has made it possible and desirable for users, such as businesses and governments, to migrate their data to be hosted on infrastructure managed by third parties. The chapter further outlines why aspects of migration to cloud services pose specific legal, contractual, and technical challenges for governments.
The chapter further outlines the challenge of addressing contracting and procurement requirements, data privacy and jurisdictional obligations when using an opaque, global, multi-tenant technology such as cloud computing.