<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Quantum Computing</title><link href="http://sei.cmu.edu/feeds/topic/quantum-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/quantum-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/quantum-computing/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2023-08-28T00:00:00-04:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Quantum Computing</subtitle><entry><title>The Need for Quantum Software Architecture</title><link href="https://www.sei.cmu.edu/blog/the-need-for-quantum-software-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-08-28T00:00:00-04:00</published><updated>2023-08-28T00:00:00-04:00</updated><author><name>Daniel Justice, Andrew Mellinger</name></author><id>https://www.sei.cmu.edu/blog/the-need-for-quantum-software-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explores concerns software architects are likely to have when integrating quantum components into their systems.</summary></entry><entry><title>Cybersecurity of Quantum Computing: A New Frontier</title><link href="https://www.sei.cmu.edu/blog/cybersecurity-of-quantum-computing-a-new-frontier/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-04-10T00:00:00-04:00</published><updated>2023-04-10T00:00:00-04:00</updated><author><name>Tom Scanlon</name></author><id>https://www.sei.cmu.edu/blog/cybersecurity-of-quantum-computing-a-new-frontier/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post details issues related to creating the discipline of cyber protection of quantum computing and also outlines six areas of future research in the field of quantum cybersecurity.</summary></entry><entry><title>Achieving the Quantum Advantage in Software</title><link href="https://www.sei.cmu.edu/blog/achieving-the-quantum-advantage-in-software/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-12-16T00:00:00-05:00</published><updated>2019-12-16T00:00:00-05:00</updated><author><name>Jason Larkin, Daniel Justice</name></author><id>https://www.sei.cmu.edu/blog/achieving-the-quantum-advantage-in-software/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post details an effort that focuses on near-term quantum computing for software verification and validation within the DoD.</summary></entry></feed>