Moore’s Law and Quantum Computing

Quantum Computing

1971 saw the release of the world’s first commercially available microprocessor – Intel’s 4004. In the years that have followed we have seen unparalleled advancement, if the car had improved at the same rate as computer chips since 1971, by 2015 cars would been able to hit speeds of about 420 million miles per hour – with that number doubled by the end of this year!}

Intel’s co-founder, Gordon Moore, keenly noted in 1965 that the number of transistors per square inch on integrated circuits had doubled every year since their invention; he predicted that processing power would double every two years for the foreseeable future, and despite constant dismissal that the theory is dead, or will soon be dead the inevitable march of progress continues to defy speculation. But given that each year more and more money is required to make processors smaller and faster, it is inevitable that new ways of designing computer chips (or new ways of designing computers themselves) will be the driver for the next generation of innovation.

3-D Microprocessors

Although it becoming almost impossible to fit more transistors onto new microprocessors, the idea of stacked micro-chips is providing new life in the pursuit of speed (processing speed that is). 3D chips might seem like a logical next step once you think about it, but until recently it has been all but impossible to stack microchips without them melting. However, researchers from Stanford and 3 other universities have developed a brand new technique for stacking chips called Nano-Engineered Computing Systems Technology, or N3XT. These new chip designs run roughly 1,000 time more efficiently that traditional 2d configurations – so it looks like Moore’s law may just be a warm up for this level of innovation, although type of sustained improvement is unlikely to continue.

They solved the main problem with stacking chips (the level of heat required to fabricate each level) by creating nano-materials that can be fabricated at lower temperatures – thus avoiding the risk of frying the lower layers of circuitry as the processors are built up. In addition to this they developed electric “ladders” or “elevators” that can move more data over a short distance all while using less power than traditional wiring.

Exotic Computing

Quantum computing may seem like an exotic and far-fetched idea, one only possible in the far reaches of science fiction. However, several tech giants (Microsoft, IBM, and Google) have been pouring money into developing quantum chips – in fact you can actually try your hand at programming with IBM’s quantum chip virtually on their website here. Having been confined to theoretical research for the last decade, there has finally been a breakthrough and researchers at the University of Sussex have just unveiled plans to build what could be the world’s first quantum computer!

Quantum computing takes advantage of the quantum physics phenomenon of super-position; the idea that on a quantum level, particles can be in two places at once. By taking advantage of this quirk of the quantum world, physicists and computer technicians can create computers with much more processing power than they could using regular silicon microprocessors.

Unfortunately, these advancements are unlikely to ever be seen in personal computers as quantum computers are generally intended to use for processing mathematical problems, data analytics, and cryptography – as they can solve these problems much quicker than any traditional super-computer!

Computing in the Cloud

There is a third avenue down which we could go to achieve great processing power, cloud computing. This is hardly a new idea, but the concept for improving computing power on our everyday devices may be lost on some. While it may soon be impossible to fit smaller or more powerful processors into IoT (Internet of Things) devices, any complex computing could soon be done in the cloud. The size of data centres is not restricted by the limits of a mobile phone or laptop, thus by reallocating data processing from our mobile devices – just like Apple do with Siri – we could massively expand the possibilities we have to process data from our IoT devices!

Moore’s law has provided us with a relative certainty in the speed of progress for the last 50 years, but things are about to change. Advancements will now come it fits and starts, and technology scrambles to keep pace with consumer demand for faster and faster devices. We are on the verge of some incredible advancements in terms of processing power, but we could be waiting there a while.

By Josh Hamilton

Recovery Experts.png
Disaster Recovery Plan.png
Data Bed.png
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
Jim Fagan
Subsea Connectivity Digital transformation and the migration of data and applications to the cloud is a global phenomenon. While we may like to think that the cloud knows no borders, the reality is that geopolitics ...
Rakesh Soni
5 Common Myths About Cloud Computing Cloud computing has offered new horizons to businesses embarking on a digital transformation journey. However, no matter how appealing, it’s also a reason to worry. With cloud computing, businesses ...
Rahul Subramanyam
Fixing AWS: The CloudFix Story A conversation with Rahul Subramanyam. CEO at CloudFix, and CTO at ESW Capital AWS is huge, but it’s not perfect. Because of its size and its approach to innovation there ...
Gilad David Maayan
What is Zero Trust Network Access (ZTNA)? In a zero-trust security model, all user connections are authenticated, and users only receive the access and privileges they need to fulfill their role. This is very different ...
  • Plural Site


    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2


    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary


    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.