Minutes To A New Midnight: Our Accelerating Race with Quantum Computing and AI

black and white wall clock

We hear it all the time – “rapidly-changing environment”. It tends to blur into the background of our language in the office and in technology as a looming force ever arriving at the horizon of how we interact and transact. This is only a half-truth, as the rapidly-changing environment is also accelerating at which it is changing.

It was announced recently that the newest generation of Quantum Supercomputers can process and calculate a problem with the size and complexity that would take its predecessor septillions of years to complete, in minutes. For those wondering, a septillion has twenty-four zeros. This amount of time, complexity and magnitude of processing power this represents is barely comprehendible, and represents a huge step in how we navigate our world with technology.

close up photo of mining rig
Photo by panumas nikhomkhai on Pexels.com

This also represents a development into a sort of “weapons grade” technology and computation power, harkening back to the “doomsday clock” visual during the cold war. Each minute closer to midnight represents our closeness to the end, and while this was traditionally applied to means of war like nuclear weapons, these new leaps in computational technology carry that torch into our new digital age.

A significant part of modern warfare is fought through infrastructure, logistics and and ever increasing reliance on the digital systems that coordinate them. Since its birth and inception the internet has served as an information distribution equalizer, allowing seemingly small players to hold outsized leverage to larger forces in the space. A single computer worm or virus has historically caused incalculable damage to how our society works, and this nimbleness to powerful computers only amplifies this danger.

Our current model of cybersecurity is based on system complexity, completeness of coverage on potential vulnerabilities, and the people that participate in that security system. In an environment where passwords of virtually any complexity and length can be cracked in moments, we will need to rethink our approach to security of our existing and upcoming technology.

Our more complex processing tasks take an often unseen amount of power and resources. Every time that we search on Google, processing power is used to bring us the results that we want returned. This takes the shape of electricity used, bandwidth on existing infrastructure capacity. The development of generative AI has accelerated this resource use as well; with some Large Language Models (LLMs) queries using the same energy as dozens of normal web searches. As we move to a model of interacting online that involves more AI, machine learning and resource intensive systems, this will only increase our demand for energy to run these systems. We experienced this and continue to see it in the mining and management of cryptocurrency and NFTs and is a point to be considered as we continue into this new age of technological acceleration.

white windmill
Photo by Pixabay on Pexels.com

Security and sustainability of our computation resources will be critical in how the next years and generations of technology unfold. Responsible use of computational power and AI usage must come from a reductive mindset to its use to where only the absolutely necessary components of these systems are supported by these cutting edge technologies.

– Andi

More Than Looks: How To Make Your Website Perform

data codes through eyeglasses

If you’re looking to launch your business online, there’s no shortage of options for you to make that a reality. Every other ad brags about launching your own website in an afternoon. Great! You sit down, you grab your credit card and begin claiming your domain. Website in an afternoon. Easy, right?

There’s much more to building your site than just claiming your domain and uploading some photos. With the right key words, structure and content your site can draw and convert the customers you’re looking for! Conversely, do it wrong and you could be missing out on finding (or worse, frustrating) valuable customers.

Starting with the structure, your customer should ideally be within 1-3 clicks away from being able to buy from any page. Keeping your website simple but descriptive can help concentrate traffic to where you want it to go. Your top and bottom navigation menus should also reflect this easily understood structure.

Your content should reflect and answer what your customers are searching for in Google and other search engines. Ensure that you’re using proper key wording to capture these searches on google and driving relevant traffic. Enriching content with links, embedded images and widgets with metadata will help ensure Google assesses your site positively. These best practices will help grow your audience and continue that growth as policies and technologies evolve online.

In addition to design aesthetics and your choice of photos to upload to your site, there is a depth of metadata that helps identify your site with search engines and drive relevant traffic to you. Understanding how to configure and update this metadata can make or break a site’s presence on Google (search engines don’t have eyes, yet). Your website should follow ADA Accessibility standards and regulations including color contrast degrees, image to text data and other features required for your site. Check to ensure that you have an active SSL certificate installed on your site and that it is working properly. Websites without SSL certificates are often blocked and/or dropped in search favorability.

Keep in mind the amount of data that your website uses every time a page is loaded. If your pages take longer to load, you may need to reduce your image sizes or site complexity. This can be done through compression, choosing a lower image resolution or consolidating pages.

Want help? We can help from full-service to consultation and planning for your next website project. Let’s connect.

-Andi