Apply for QCSYS and discover how the physics and mathematics of quantum mechanics and cryptography merge into one of the most exciting topics in contemporary science – quantum cryptography.
Speaker: Tom Hunter and Neil Henderson
Abstract: A lot of different concepts and possibilities have been discussed. The final session will recap those and put them in perspective, with emphasis on the relevance to a "typical" university start up and the people involved.
Join us at the Institute for Quantum Computing for a two-week introduction to the theoretical and experimental study of quantum information processing.
During the Undergraduate School on Experimental Quantum Information Processing (USEQIP) will be exposed to lectures and experiments on the following topics and more.
Speaker: Jacqueline Armstrong Gates
Speaker: Doug Beynon
Speaker: Tom Hunter
Speaker: Viona Duncan
Abstract: We all want to be the nice guy, but we do not want to finish last. How should we respect the IP of others, particularly confidential information and what should we expect of others when we provide confidential information to them? Simple steps that can be taken to meet obligations and preserve confidentiality will be discussed. You may also have obligations to funding agencies and the University. The UW IP policy will be discussed along with issues of ownership and employee confidentiality.
Jiawei Ji - The University of Calgary
Ke He, Tsinghua University
On Thursday, January 25, 2018, Transformative Quantum Technologies (TQT) will host a Lunch and Learn on the topic of startups.
The event will feature a panel of four speakers who will share their perspective on startup formation and resources. Each panelist will provide a brief presentation followed by a Q&A session.
Thursday, January 25, 2018
12:15PM - 1:45PM
Elizabeth Crosson, California Institute of Technology
Speaker: Heather Hoff
Abstract: Software is a key asset of any new business. How do you protect the results of weeks or months of hard labour? Who owns the software and how do I mange its development to ensure its inherent value is maintained? Should I use Open Source, or even contribute to Open Source? What are the benefits and how does this measure up against the risks?
MSc Thesis Presentation
Candidate: Matthew Brown
PhD Comprehensive Seminar
Candidate: Guillaume Verdon-Akzam
Brandon Buonacorsi - Modeling the Exchange Interaction in Silicon Quantum Dots
Candidate: Michael Mazurek
Title: Testing classical and quantum theory with single photons
CryptoWorks21 at the University of Waterloo, together with representatives from the Standards Council of Canada (SCC) and the European Telecommunications Standards Institute (ETSI), are proud to present a lunch-time standards session.
Candidate: Elena Anisimova
Title: Single-photon detectors for long distance quantum communications
“He who is good with a hammer thinks everything is a nail.”
- Modified quote from the original by Abraham Maslow
How does one sell security? How does one commercialize such nebulous concepts such as “Trust”, “Security” and “Cryptography”? Cryptography, which is just one building block of security, is based on other more abstract building blocks such as algorithms which have a foundation on hard mathematical problems.