SlideShare a Scribd company logo
The Fastest Possible Search
Algorithm

   Sep, 2011
                        Daniel Austin
                        Technical Staff
                        PayPal, Inc.
Surge 2011 Conference
September 28, 2011
INTRO: GROVER’S SEARCH

• “Grover‟s Search” is the name of a
  Quantum Computing algorithm for
  searching random databases. It‟s the
  fastest possible search algorithm in this
  universe, running in O(N^1/2) (as
  opposed to O(N) in the macroverse)

• The challenge: Quantum Computing
  101 in 10 minutes



                                Confidential and Proprietary
QUANTUM COMPUTING 101

     • Describes quantum logical processes
       analogous to classical computing
     • Multivariate Logic
           – Bits: yes|| no
           – Qubits: yes||no||maybe
           – Probabilistic results instead of hard answers
     • Quantum “Weirdness”
           – Teleportation, superdense coding, non-
             causal computations, multiversal
             parallelism, entanglement, cryptography
R. P. Feynman, “Quantum mechanical computers”, Optics News, February 1985, 11, p. 11



                                                                         Confidential and Proprietary
CURRENT STATE OF QUANTUM
COMPUTATIONAL PLAY

•   We can now read and write 16 qubits
•   Transient spintronics experiments ~ 2000 ms!
•   Teleportation: intercontinental, ~ 5000 KM
•   IBM demonstrates true entanglement 2006
•   RSA algorithm Cracked 2008
•   Yale demonstrates 1st quantum chip 2009
•   D-Wave Announces the first commercially
    available „quantum computer‟ May 2011!
    – (But does it really work??)




                                    Confidential and Proprietary
QUANTUM LOGIC GATES


• Like classical logic
  circuits, but
  additional quantum
  logic gates
• Hadamard, Pi/8
  (phase), CNOT,
  many others


Images courtesy Wikipedia.com



                                Confidential and Proprietary
GROVER’S SEARCH




Image courtesy Bernard Omer “Quantum Programming in QCL” 2007


                                                                Confidential and Proprietary
GROVER’S CODE!

operator diffuse (qureg q) {
      H(q); // Hadamard Transform
     Not(q); // Invert q
     CPhase(pi, q); // Rotate if q=1111..
     !Not(q); // undo inversion
     !H(q); // undo Hadamard Transform
}




                               Confidential and Proprietary
FASTEST POSSIBLE?? PROVE IT!

• Classical v. Quantum: O(N) v
  O(N^1/2) (!)
• Any alternate algorithm will have to
  run at least as many iterations
• Proof can‟t be contained in 1 slide! 




                               Confidential and Proprietary
SUMMING UP

Quantum Computing is real and coming
 soon to a computer near you
QC algorithms are qualitatively different
 and can perform non-classical feats of
 computation
Rapid progress in the field right now
  – 1st commercial implementations
  – Quantum cryptography, teleportation,
    spintronics all featured in Nature this week!



                                    Confidential and Proprietary
QUANTUM ADVICE
I think I can safely say that nobody understands
quantum mechanics. ... Do not keep saying to yourself,
if you can possibly avoid it, 'But how can it be like that?'
because you will get 'down the drain', into a blind alley
from which nobody has yet escaped. Nobody knows how
it can be like that.

Richard Feynman, The Character of Physical Law



                        Daniel Austin
                        PayPal, Inc.
                        daaustin@PayPal.com
                        @daniel_b_austin


                                            Confidential and Proprietary

More Related Content

Similar to The Fastest Possible Search Algorithm

Quantum computation: past-now-future - 2021-06-19
Quantum computation: past-now-future - 2021-06-19Quantum computation: past-now-future - 2021-06-19
Quantum computation: past-now-future - 2021-06-19
Aritra Sarkar
 
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityDEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
Felipe Prado
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
AliceBob EveMallory
 
Quantum computing
Quantum computingQuantum computing
The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...
The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...
The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...
Daniel Austin
 
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviterSergii Nechuiviter
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
ApurbaChatterjee16
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
Prasanna Venkatesan
 
Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)
Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)
Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)
Rana Prathap Simh Mukthavaram
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
Mike Hogarth, MD, FACMI, FACP
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Abhishek Jaisingh
 
IMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptx
IMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptxIMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptx
IMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptx
nandini224983
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
alimohammed194539
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
zuhaibmohammed465
 
preskill.pptx
preskill.pptxpreskill.pptx
preskill.pptx
Hammad698065
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURE
SMALAIAPPANSRIKANTH
 
BCS APSG Quantum Computing tutorial
BCS APSG Quantum Computing tutorialBCS APSG Quantum Computing tutorial
BCS APSG Quantum Computing tutorial
Geoff Sharman
 
Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...
Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...
Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...
Dr Rajnish Mallick
 

Similar to The Fastest Possible Search Algorithm (20)

Quantum computation: past-now-future - 2021-06-19
Quantum computation: past-now-future - 2021-06-19Quantum computation: past-now-future - 2021-06-19
Quantum computation: past-now-future - 2021-06-19
 
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityDEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...
The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...
The Fastest Possible Search Algorithm: Grover's Search and the World of Quant...
 
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)
Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)
Intro to Quantum Computing - IndiQ Hyderabad meetup (Feb 2nd)
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
IMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptx
IMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptxIMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptx
IMPLEMENTATION OF QUANTUM LOGIC GATES (1).pptx
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
 
Devilz craft
Devilz craftDevilz craft
Devilz craft
 
preskill.pptx
preskill.pptxpreskill.pptx
preskill.pptx
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURE
 
BCS APSG Quantum Computing tutorial
BCS APSG Quantum Computing tutorialBCS APSG Quantum Computing tutorial
BCS APSG Quantum Computing tutorial
 
Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...
Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...
Quantum Computing Primer - Future of Scientific Computing: Opportunities for ...
 

More from Daniel Austin

Next generation web protocols
Next generation web protocolsNext generation web protocols
Next generation web protocols
Daniel Austin
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
Daniel Austin
 
Performance: How Fast is Fast Enough?
Performance: How Fast is Fast Enough?Performance: How Fast is Fast Enough?
Performance: How Fast is Fast Enough?
Daniel Austin
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
Daniel Austin
 
Big data comes in small packages v1.2
Big data comes in small packages v1.2Big data comes in small packages v1.2
Big data comes in small packages v1.2
Daniel Austin
 
Designing Delay-tolerant Data Services for the Network of Things
Designing Delay-tolerant Data Services for the Network of ThingsDesigning Delay-tolerant Data Services for the Network of Things
Designing Delay-tolerant Data Services for the Network of Things
Daniel Austin
 
Web Performance Bootcamp 2014
Web Performance Bootcamp 2014Web Performance Bootcamp 2014
Web Performance Bootcamp 2014
Daniel Austin
 
HTML5, HTTP2, and You 1.1
HTML5, HTTP2, and You 1.1HTML5, HTTP2, and You 1.1
HTML5, HTTP2, and You 1.1
Daniel Austin
 
Managing Performance Globally with MySQL
Managing Performance Globally with MySQLManaging Performance Globally with MySQL
Managing Performance Globally with MySQL
Daniel Austin
 
Web Performance BootCamp 2013
Web Performance BootCamp 2013Web Performance BootCamp 2013
Web Performance BootCamp 2013
Daniel Austin
 
Perspectives on the Evolution of HTML
Perspectives on the Evolution of HTMLPerspectives on the Evolution of HTML
Perspectives on the Evolution of HTML
Daniel Austin
 
Reconceiving the Web as a Distributed (NoSQL) Data System
Reconceiving the Web as a Distributed (NoSQL) Data SystemReconceiving the Web as a Distributed (NoSQL) Data System
Reconceiving the Web as a Distributed (NoSQL) Data System
Daniel Austin
 
Big data and the Future of Money (World Big Data Congress 2013)
Big data and the Future of Money (World Big Data Congress 2013)Big data and the Future of Money (World Big Data Congress 2013)
Big data and the Future of Money (World Big Data Congress 2013)
Daniel Austin
 
Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)
Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)
Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)
Daniel Austin
 
Performance analysisclass
Performance analysisclassPerformance analysisclass
Performance analysisclass
Daniel Austin
 
Yes sql08 inmemorydb
Yes sql08 inmemorydbYes sql08 inmemorydb
Yes sql08 inmemorydb
Daniel Austin
 
A Global In-memory Data System for MySQL
A Global In-memory Data System for MySQLA Global In-memory Data System for MySQL
A Global In-memory Data System for MySQL
Daniel Austin
 
Notes on a High-Performance JSON Protocol
Notes on a High-Performance JSON ProtocolNotes on a High-Performance JSON Protocol
Notes on a High-Performance JSON Protocol
Daniel Austin
 
Wrestling Large Data Volumes to the Ground
Wrestling Large Data Volumes to the GroundWrestling Large Data Volumes to the Ground
Wrestling Large Data Volumes to the Ground
Daniel Austin
 

More from Daniel Austin (19)

Next generation web protocols
Next generation web protocolsNext generation web protocols
Next generation web protocols
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
Performance: How Fast is Fast Enough?
Performance: How Fast is Fast Enough?Performance: How Fast is Fast Enough?
Performance: How Fast is Fast Enough?
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
Big data comes in small packages v1.2
Big data comes in small packages v1.2Big data comes in small packages v1.2
Big data comes in small packages v1.2
 
Designing Delay-tolerant Data Services for the Network of Things
Designing Delay-tolerant Data Services for the Network of ThingsDesigning Delay-tolerant Data Services for the Network of Things
Designing Delay-tolerant Data Services for the Network of Things
 
Web Performance Bootcamp 2014
Web Performance Bootcamp 2014Web Performance Bootcamp 2014
Web Performance Bootcamp 2014
 
HTML5, HTTP2, and You 1.1
HTML5, HTTP2, and You 1.1HTML5, HTTP2, and You 1.1
HTML5, HTTP2, and You 1.1
 
Managing Performance Globally with MySQL
Managing Performance Globally with MySQLManaging Performance Globally with MySQL
Managing Performance Globally with MySQL
 
Web Performance BootCamp 2013
Web Performance BootCamp 2013Web Performance BootCamp 2013
Web Performance BootCamp 2013
 
Perspectives on the Evolution of HTML
Perspectives on the Evolution of HTMLPerspectives on the Evolution of HTML
Perspectives on the Evolution of HTML
 
Reconceiving the Web as a Distributed (NoSQL) Data System
Reconceiving the Web as a Distributed (NoSQL) Data SystemReconceiving the Web as a Distributed (NoSQL) Data System
Reconceiving the Web as a Distributed (NoSQL) Data System
 
Big data and the Future of Money (World Big Data Congress 2013)
Big data and the Future of Money (World Big Data Congress 2013)Big data and the Future of Money (World Big Data Congress 2013)
Big data and the Future of Money (World Big Data Congress 2013)
 
Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)
Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)
Big Data is a Big Scam Most of the Time! (MySQL Connect Keynote 2012)
 
Performance analysisclass
Performance analysisclassPerformance analysisclass
Performance analysisclass
 
Yes sql08 inmemorydb
Yes sql08 inmemorydbYes sql08 inmemorydb
Yes sql08 inmemorydb
 
A Global In-memory Data System for MySQL
A Global In-memory Data System for MySQLA Global In-memory Data System for MySQL
A Global In-memory Data System for MySQL
 
Notes on a High-Performance JSON Protocol
Notes on a High-Performance JSON ProtocolNotes on a High-Performance JSON Protocol
Notes on a High-Performance JSON Protocol
 
Wrestling Large Data Volumes to the Ground
Wrestling Large Data Volumes to the GroundWrestling Large Data Volumes to the Ground
Wrestling Large Data Volumes to the Ground
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

The Fastest Possible Search Algorithm

  • 1. The Fastest Possible Search Algorithm Sep, 2011 Daniel Austin Technical Staff PayPal, Inc. Surge 2011 Conference September 28, 2011
  • 2. INTRO: GROVER’S SEARCH • “Grover‟s Search” is the name of a Quantum Computing algorithm for searching random databases. It‟s the fastest possible search algorithm in this universe, running in O(N^1/2) (as opposed to O(N) in the macroverse) • The challenge: Quantum Computing 101 in 10 minutes Confidential and Proprietary
  • 3. QUANTUM COMPUTING 101 • Describes quantum logical processes analogous to classical computing • Multivariate Logic – Bits: yes|| no – Qubits: yes||no||maybe – Probabilistic results instead of hard answers • Quantum “Weirdness” – Teleportation, superdense coding, non- causal computations, multiversal parallelism, entanglement, cryptography R. P. Feynman, “Quantum mechanical computers”, Optics News, February 1985, 11, p. 11 Confidential and Proprietary
  • 4. CURRENT STATE OF QUANTUM COMPUTATIONAL PLAY • We can now read and write 16 qubits • Transient spintronics experiments ~ 2000 ms! • Teleportation: intercontinental, ~ 5000 KM • IBM demonstrates true entanglement 2006 • RSA algorithm Cracked 2008 • Yale demonstrates 1st quantum chip 2009 • D-Wave Announces the first commercially available „quantum computer‟ May 2011! – (But does it really work??) Confidential and Proprietary
  • 5. QUANTUM LOGIC GATES • Like classical logic circuits, but additional quantum logic gates • Hadamard, Pi/8 (phase), CNOT, many others Images courtesy Wikipedia.com Confidential and Proprietary
  • 6. GROVER’S SEARCH Image courtesy Bernard Omer “Quantum Programming in QCL” 2007 Confidential and Proprietary
  • 7. GROVER’S CODE! operator diffuse (qureg q) { H(q); // Hadamard Transform Not(q); // Invert q CPhase(pi, q); // Rotate if q=1111.. !Not(q); // undo inversion !H(q); // undo Hadamard Transform } Confidential and Proprietary
  • 8. FASTEST POSSIBLE?? PROVE IT! • Classical v. Quantum: O(N) v O(N^1/2) (!) • Any alternate algorithm will have to run at least as many iterations • Proof can‟t be contained in 1 slide!  Confidential and Proprietary
  • 9. SUMMING UP Quantum Computing is real and coming soon to a computer near you QC algorithms are qualitatively different and can perform non-classical feats of computation Rapid progress in the field right now – 1st commercial implementations – Quantum cryptography, teleportation, spintronics all featured in Nature this week! Confidential and Proprietary
  • 10. QUANTUM ADVICE I think I can safely say that nobody understands quantum mechanics. ... Do not keep saying to yourself, if you can possibly avoid it, 'But how can it be like that?' because you will get 'down the drain', into a blind alley from which nobody has yet escaped. Nobody knows how it can be like that. Richard Feynman, The Character of Physical Law Daniel Austin PayPal, Inc. daaustin@PayPal.com @daniel_b_austin Confidential and Proprietary

Editor's Notes

  1. Note that this is a work in progressStill being worked on, things are fluid though the direction is clear