Submit Search
Upload
Qiskit installation guide
•
Download as PPTX, PDF
•
0 likes
•
77 views
S
SoyoungShin14
Follow
Qiskit installation guide for the beginner
Read less
Read more
Education
Report
Share
Report
Share
1 of 23
Download now
Recommended
Usernetes: Kubernetes as a non-root user
Usernetes: Kubernetes as a non-root user
Akihiro Suda
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg kali linux
shamsaot
The State of Rootless Containers
The State of Rootless Containers
Akihiro Suda
CDI and Seam 3: an Exciting New Landscape for Java EE Development
CDI and Seam 3: an Exciting New Landscape for Java EE Development
Saltmarch Media
Kalilinux
Kalilinux
almuhairi2000
Cinder Update, OpenInfra Meetup Q3 China, 2020-09-26
Cinder Update, OpenInfra Meetup Q3 China, 2020-09-26
Brian Rosmaita
Slides from IPv6 Threats
Slides from IPv6 Threats
Cyren, Inc
A timeline for embedded Linux
A timeline for embedded Linux
Chris Simmonds
Recommended
Usernetes: Kubernetes as a non-root user
Usernetes: Kubernetes as a non-root user
Akihiro Suda
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg kali linux
shamsaot
The State of Rootless Containers
The State of Rootless Containers
Akihiro Suda
CDI and Seam 3: an Exciting New Landscape for Java EE Development
CDI and Seam 3: an Exciting New Landscape for Java EE Development
Saltmarch Media
Kalilinux
Kalilinux
almuhairi2000
Cinder Update, OpenInfra Meetup Q3 China, 2020-09-26
Cinder Update, OpenInfra Meetup Q3 China, 2020-09-26
Brian Rosmaita
Slides from IPv6 Threats
Slides from IPv6 Threats
Cyren, Inc
A timeline for embedded Linux
A timeline for embedded Linux
Chris Simmonds
Hack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
IPv6 Security Potpourri
IPv6 Security Potpourri
_xhr_
Distro Recipes 2013 : Upstream management and consequences on the distributi...
Distro Recipes 2013 : Upstream management and consequences on the distributi...
Anne Nicolas
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
Huda Seyam
Acid
Acid
Michael Boman
Secure development on Kubernetes by Andreas Falk
Secure development on Kubernetes by Andreas Falk
SBA Research
TechWiseTV Workshop: Programmable ASICs
TechWiseTV Workshop: Programmable ASICs
Robb Boyd
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Huda Seyam
Node mcu x raspberrypi2 x mqtt
Node mcu x raspberrypi2 x mqtt
承翰 蔡
Distro Recipes 2013 : Make Debian and compiler agnostic
Distro Recipes 2013 : Make Debian and compiler agnostic
Anne Nicolas
Kernel Recipes 2017 - Linux Kernel Release Model - Greg KH
Kernel Recipes 2017 - Linux Kernel Release Model - Greg KH
Anne Nicolas
Introduction To NIDS
Introduction To NIDS
Michael Boman
Comparing Next-Generation Container Image Building Tools
Comparing Next-Generation Container Image Building Tools
Akihiro Suda
Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view
IPv6 Conference
Open network architecture e book
Open network architecture e book
COMSATS
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Michael Man
Rootless Kubernetes
Rootless Kubernetes
Akihiro Suda
OpenShift Commons Briefing: Ask Me Anything about Cinder and Glance
OpenShift Commons Briefing: Ask Me Anything about Cinder and Glance
Brian Rosmaita
Linux on RISC-V
Linux on RISC-V
Drew Fustini
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Ahmed Habib
Programming IoT with Docker: How to Start?
Programming IoT with Docker: How to Start?
msyukor
Moby Open Source Summit North America 2017
Moby Open Source Summit North America 2017
Patrick Chanezon
More Related Content
What's hot
Hack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
IPv6 Security Potpourri
IPv6 Security Potpourri
_xhr_
Distro Recipes 2013 : Upstream management and consequences on the distributi...
Distro Recipes 2013 : Upstream management and consequences on the distributi...
Anne Nicolas
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
Huda Seyam
Acid
Acid
Michael Boman
Secure development on Kubernetes by Andreas Falk
Secure development on Kubernetes by Andreas Falk
SBA Research
TechWiseTV Workshop: Programmable ASICs
TechWiseTV Workshop: Programmable ASICs
Robb Boyd
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Huda Seyam
Node mcu x raspberrypi2 x mqtt
Node mcu x raspberrypi2 x mqtt
承翰 蔡
Distro Recipes 2013 : Make Debian and compiler agnostic
Distro Recipes 2013 : Make Debian and compiler agnostic
Anne Nicolas
Kernel Recipes 2017 - Linux Kernel Release Model - Greg KH
Kernel Recipes 2017 - Linux Kernel Release Model - Greg KH
Anne Nicolas
Introduction To NIDS
Introduction To NIDS
Michael Boman
Comparing Next-Generation Container Image Building Tools
Comparing Next-Generation Container Image Building Tools
Akihiro Suda
Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view
IPv6 Conference
Open network architecture e book
Open network architecture e book
COMSATS
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Michael Man
Rootless Kubernetes
Rootless Kubernetes
Akihiro Suda
OpenShift Commons Briefing: Ask Me Anything about Cinder and Glance
OpenShift Commons Briefing: Ask Me Anything about Cinder and Glance
Brian Rosmaita
Linux on RISC-V
Linux on RISC-V
Drew Fustini
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Ahmed Habib
What's hot
(20)
Hack wifi password using kali linux
Hack wifi password using kali linux
IPv6 Security Potpourri
IPv6 Security Potpourri
Distro Recipes 2013 : Upstream management and consequences on the distributi...
Distro Recipes 2013 : Upstream management and consequences on the distributi...
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
Acid
Acid
Secure development on Kubernetes by Andreas Falk
Secure development on Kubernetes by Andreas Falk
TechWiseTV Workshop: Programmable ASICs
TechWiseTV Workshop: Programmable ASICs
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Node mcu x raspberrypi2 x mqtt
Node mcu x raspberrypi2 x mqtt
Distro Recipes 2013 : Make Debian and compiler agnostic
Distro Recipes 2013 : Make Debian and compiler agnostic
Kernel Recipes 2017 - Linux Kernel Release Model - Greg KH
Kernel Recipes 2017 - Linux Kernel Release Model - Greg KH
Introduction To NIDS
Introduction To NIDS
Comparing Next-Generation Container Image Building Tools
Comparing Next-Generation Container Image Building Tools
Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view
Open network architecture e book
Open network architecture e book
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Rootless Kubernetes
Rootless Kubernetes
OpenShift Commons Briefing: Ask Me Anything about Cinder and Glance
OpenShift Commons Briefing: Ask Me Anything about Cinder and Glance
Linux on RISC-V
Linux on RISC-V
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Similar to Qiskit installation guide
Programming IoT with Docker: How to Start?
Programming IoT with Docker: How to Start?
msyukor
Moby Open Source Summit North America 2017
Moby Open Source Summit North America 2017
Patrick Chanezon
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
IGedeArieYogantaraSu
DockerDay2015: Keynote
DockerDay2015: Keynote
Docker-Hanoi
Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!
Codemotion
ITE7_Chp9.pptx
ITE7_Chp9.pptx
ssusera76ea9
nativeappdevelopmentwithpython1658264723355.pdf
nativeappdevelopmentwithpython1658264723355.pdf
scossy1
Radiomic Features.pdf
Radiomic Features.pdf
LallHussain
Strata - Scaling Jupyter with Jupyter Enterprise Gateway
Strata - Scaling Jupyter with Jupyter Enterprise Gateway
Luciano Resende
TDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux Embarcado
tdc-globalcode
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
Weerayut Hongsa
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017
Robert Parker
JavaOne 2016 - Faces Counter
JavaOne 2016 - Faces Counter
Coritel
Run Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using Yocto
Marco Cavallini
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Stéphanie Roger
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
PROIDEA
"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016
Phil Estes
Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330
Takaaki Suzuki
Fedora on risc-v_tokyo_30_sep_2019_v4
Fedora on risc-v_tokyo_30_sep_2019_v4
Wei Fu
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
Rofiq Fauzi
Similar to Qiskit installation guide
(20)
Programming IoT with Docker: How to Start?
Programming IoT with Docker: How to Start?
Moby Open Source Summit North America 2017
Moby Open Source Summit North America 2017
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
DockerDay2015: Keynote
DockerDay2015: Keynote
Lab Handson: Power your Creations with Intel Edison!
Lab Handson: Power your Creations with Intel Edison!
ITE7_Chp9.pptx
ITE7_Chp9.pptx
nativeappdevelopmentwithpython1658264723355.pdf
nativeappdevelopmentwithpython1658264723355.pdf
Radiomic Features.pdf
Radiomic Features.pdf
Strata - Scaling Jupyter with Jupyter Enterprise Gateway
Strata - Scaling Jupyter with Jupyter Enterprise Gateway
TDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux Embarcado
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
CodeIgniter For Project : Workshop 001 - Install Docker and CodeIgniter
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017
JavaOne 2016 - Faces Counter
JavaOne 2016 - Faces Counter
Run Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using Yocto
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016
Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330
Fedora on risc-v_tokyo_30_sep_2019_v4
Fedora on risc-v_tokyo_30_sep_2019_v4
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
Recently uploaded
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
UjwalaBharambe
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
Virag Sontakke
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
OH TEIK BIN
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Celine George
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
iammrhaywood
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Celine George
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Virag Sontakke
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Sabitha Banu
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
unnathinaik
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
InMediaRes1
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
mkooblal
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
RaymartEstabillo3
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Marc Dusseiller Dusjagr
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
JiesonDelaCerna
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
thorishapillay1
Recently uploaded
(20)
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Qiskit installation guide
1.
IBM Quantum /
© 2020 IBM Corporation Introduction to Qiskit – Installation tutorial Soyoung Shin Qiskit Advocate, PhD. Candidate SNU
2.
Table of Contents 1.
Introduction to Qiskit 2. Qiskit Installation Tutorial – on Local machine 1. Requirements 2. Install Anaconda – In Windows, MAC and Linux 3. Install Qiskit and Verify Installation 3. Using Qiskit on Cloud: IQX(IBM Quantum Experience) IBM Quantum / © 2020 IBM Corporation
3.
Introduction to Qiskit 3 ©
2020 IBM Corporation
4.
Qiskit Introduction What is
Qiskit Qiskit [quiss-kit] is an open source SDK for working with quantum computers at the level of pulses, circuits and application modules. IBM Quantum / © 2020 IBM Corporation 4 Qiskit can provide: Access to circuits: Access a rich set of well-studied circuits, which can be used as benchmarks, building blocks in more complex circuits, or as a tool to explore quantum computational advantage. Hardware Access: Execute code on multiple quantum hardware architectures, from superconducting qubits to trapped-ions. Quantum Algorithms: Research and prototype machine learning, optimization and chemistry applications by building upon a library of quantum algorithms. Noise Mitigation: Study and reduce the impact of noise using built-in modules for noise characterization and circuit optimization.
5.
Qiskit Elements 5 © 2020
IBM Corporation Aqua Ignis Aer Terra Qiskit Hardware Terra (Earth): Foundational elements Circuit, Visualization, Transpiler Manage execution on backend Aer(Air): Simulators QASM (Open Source) Statevector Simulator (1shot) Unitary Simulator(1shot) Ignis(Fire): Works on noise and errors characterize errors, error correction Aqua(Water): Real world appliation Chemistry, AI, Optimizing, Finance https://qiskit.org/documentation/the_elements.html
6.
Qiskit Installation Tutorial: on
Local machine 6 © 2020 IBM Corporation
7.
7 System architecture: Windows: 64-bit x86 32-bit
x86 MacOS: 64-bit x86 Linux: 64-bit x86 64-bit Power8/Power9 Minimum 5 GB disk space to download and install Requirements Python ≥ 3.6. 3.7 or 3.8 recommended Jupyter Notebook Anaconda recommended Operating System: Windows 8 or newer 64-bit macOS 10.13+ Linux, including Ubuntu, RedHat, CentOS 6+, etc © 2020 IBM Corporation
8.
8 Install Anaconda 1. Download
Installer © 2020 IBM Corporation https://www.anaconda.com/products/individual#Downloads
9.
9 While downloading… What is
Qiskit Advocate? © 2020 IBM Corporation
10.
Qiskit Advocate is.. Network
with experts and enthusiasts Advocates will be to a group of experts and will be a of regular information sharing sessions. Access to Qiskit core members and projects Advocates will receive special access to core members of the Qiskit team for questions and brainstorming ideas. Invitation to events Active Qiskit Advocates will be invited to attend global events created for the quantum computing community. Korea: Hyensoo (Samuel) Choi Soyoung Shin Korean: Saesun Kim (USA) 10 © 2020 IBM Corporation https://qiskit.org/advocates/ The Qiskit advocate program is a global program that provides support to the individuals who actively contribute to the Qiskit Community. https://github.com/qiskit-community/qiskit-advocate-projects
11.
11 Install Anaconda MAC © 2020
IBM Corporation GUI Installer 1. Launch Installer and install Install with recommended options In advanced option, recommend to choose “register anaconda as default python” 2. Installation Verification Cmd+Space to open Spotlight Search and find “Anaconda Navigator” 3. Set environment At terminal set conda environment for qiskit by typing conda create --name env_name 4. Activate environment conda activate env_name 5. Run Jupyter notebook at terminal type: jupyter notebook
12.
12 Install Anaconda MAC © 2020
IBM Corporation Command-line Installer 1. Launch Installer and Install: Open terminal and enter the following: bash ~/Downloads/Anaconda3- 2020.02-MacOSX- x86_64.sh 2. Installation Verification Cmd+Space to open Spotlight Search and find “Anaconda Navigator” 3. Set environment At terminal set conda environment for qiskit by typing conda create --name env_name 4. Activate environment conda activate env_name 5. Run Jupyter notebook at terminal type: jupyter notebook
13.
13 Install Anaconda Windows © 2020
IBM Corporation 1. Launch Installer Same as MAC GUI Installation 2. Installation Verification at Start menu, navigate ”Anaconda Navigator” and “Conda Prompt”
14.
14 Install Anaconda Windows © 2020
IBM Corporation 3. Set environment By Anaconda Prompt By Anaconda Navigator
15.
15 Install Anaconda Windows © 2020
IBM Corporation 4. Install and Launch jupytet notebook
16.
16 Install Anaconda Linux © 2020
IBM Corporation For x86 system: 1. Launch Installer and install At terminal, type: bash ~/Downloads/Anaconda3- 2020.02-Linux-x86_64.sh 2. Apply installation: re-open terminal or type source ~/.bashrc 3. Set environment At terminal set conda environment for qiskit by typing conda create --name env_name 4. Activate environment conda activate env_name 5. Run Jupyter notebook at terminal type: jupyter notebook Prerequisites https://docs.anaconda.com/anaconda/install/linux/ warning! must use python version less than 3.8 because of there is known error on install qiskit on linux. It will be solved with the next release. IBM Q hub also uses python 3.8
17.
17 Install Anaconda Linux © 2020
IBM Corporation For Linux Power: 1. Launch Installer and install At terminal, type: bash ~/Downloads/Anaconda3- 2020.02-Linux- ppc64le.sh 2. Apply installation: re-open terminal or type source ~/.bashrc 3. Set environment At terminal set conda environment for qiskit by typing conda create --name env_name 4. Activate environment conda activate env_name 5. Jupyter notebook Run at terminal type: jupyter notebook Prerequisites https://docs.anaconda.com/anaconda/install/linux-power8/
18.
18 Install Anaconda FAQ © 2020
IBM Corporation 1. If you want to deactivate base env conda config --set auto_activate_base false 2. If you want a env with specific python version, type conda create --name env_name python=3.7 3. How to install the previous qiskit version? Check release note: https://qiskit.org/documentation/release_notes.html you can install previous qiskit version by pip install qiskit[visualization]==0.20.0 4. (At window) I’ve encountered an ssh error! How to solve it? It’s because you did not use Anaconda. modify your firewall or try to use Anaconda
19.
19 Install Qiskit © 2020
IBM Corporation At Jupyter notebook Windows and Linux Mac or zsh using system
20.
20 Install Qiskit © 2020
IBM Corporation Verify Installation At Jupyter notebook: Check version of qiskit and other libraries
21.
Using Qiskit on
Cloud: IQX(IBM Quantum Experience) 21 © 2020 IBM Corporation
22.
22 Access to IQX ©
2020 IBM Corporation https://quantum-computing.ibm.com/
23.
23 © 2020 IBM
Corporation https://quantum-computing.ibm.com/ New Notebook+ Launch jupyter notebook
Download now