Is the Quantum Integrity Postulate on LinuxQuestions.org Accurate?

  • Thread starter Thread starter miraiw
  • Start date Start date
AI Thread Summary
The discussion revolves around a post on LinuxQuestions.org regarding quantum computing, where the original poster expresses confusion over the author's mathematical claims and terminology, particularly the concepts of a "quantum power supply" and "internal data cables." There is skepticism about the validity of these ideas, suggesting they may be fabricated solutions to the quantum decoherence problem. The poster seeks clarification and verification of these concepts, noting the difficulty in testing the proposed hypothesis. For those interested in understanding quantum computing, a recommendation is made to refer to the Wikipedia page on quantum computers for a clearer overview of the subject, including the distinction between classical bits and quantum bits.
miraiw
Messages
16
Reaction score
0
So, I'm reading http://www.linuxquestions.org/questions/blog/kenny_strawn-513767/about-quantum-computing-the-quantum-integrity-postulate-3169/" on LinuxQuestion.org, and I run across a post on quantum computing. Naturally, I take a look. When I finish reading it I'm like, "wuah?" because his math seems off.
Can anyone explain/verify what this guy said?
 
Last edited by a moderator:
Technology news on Phys.org
I'm curious what he means by a quantum power supply and internal data cables (as well as the rest of the things he lists). Sounds like a load of rubbish he just made up as his own 'solution' to the quantum decoherence problem (unless someone can tell me otherwise).

Not entirely sure how you would test this hypothesis either.

If you want to know about quantum computing, your best start will be here:
http://en.wikipedia.org/wiki/Quantum_computer
It will give you a good overview and has a far better description of bits vs. quantum bits.

Jared
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Back
Top