Categories
Computers

China becomes 3rd country to deliver quantum computers, after Canada and US – Global Times

“Wuyuan” superconducting quantum computer Photo: Courtesy of Origin Quantum

China has become the third country with the ability to deliver a completely home-made quantum computer, which was developed by a Chinese enterprise. 

Origin Quantum Computing Technology Co, a quantum computing company based in East China’s Anhui Province, has developed quantum computers and delivered one to a user, per a statement sent to the Global Times by the Anhui Quantum Computing Engineering Research Center on Monday. 

The delivery makes China the third country in the world with the ability to deliver a complete quantum computer, cementing the country’s leading position in quantum computing researches after achieving “quantum superiority,” the statement noted. 

“More than 100 quantum computing companies in the world have put enormous investment into quantum research and development. Canada’s quantum computing company sold its first quantum computer in 2011, followed by IBM of the US in 2019. Chinese Origin Quantum delivered a quantum computer in 2021,” Zhang Hui, director of the Anhui Quantum Computing Engineering Research Center, was quoted as saying. 

Zhang said that quantum computers have become an area of research competition among countries, since more and more research institutions and large companies are involved in this field, and the process of practical universal quantum computers will be accelerated.

China’s first MLLAS-100 laser annealer dedicated to quantum chip production was developed earlier in January by Origin Quantum, a move aimed at solving instability and increasing production quality when the number of quantum bits increases. 

Origin Quantum is the first quantum computing company in China. In 2020, it launched “Wuyuan,” the first domestic superconducting quantum computer, providing quantum computing services to global users through a cloud platform, according to the statement.

In 2022, Origin Quantum released its first collaborative computing system solution of a quantum computer and supercomputer, which can give full play to the advantages of quantum computers and supercomputers in both directions. 

A quantum computer is a type of computer that uses quantum mechanics so that it can perform certain kinds of computation more efficiently than a regular computer can.

Global Times

Source: https://news.google.com/__i/rss/rd/articles/CBMiNGh0dHBzOi8vd3d3Lmdsb2JhbHRpbWVzLmNuL3BhZ2UvMjAyMzAxLzEyODQ0Njcuc2h0bWzSAQA?oc=5

Categories
Computers

Hackers can make computers destroy their own chips with electricity – New Scientist

A feature of server motherboards intended to allow remote updates can be abused to trick the machines into damaging themselves beyond repair

Technology



19 January 2023

A remote hack could make servers fry the chips inside them

canjoena/Getty Images

A flaw in the control systems of server motherboards means they can be tricked into revealing sensitive data to a hacker or even destroying themselves.

A computer’s motherboard, or circuit board, hosts many of its key components and allows communication between them.

Zitai Chen and David Oswald at the University of Birmingham, UK, have found a feature in the Supermicro X11SSL-CF motherboard often used in servers that allowed them to upload their own control software. This can subsequently compromise …

Source: https://news.google.com/__i/rss/rd/articles/CBMicWh0dHBzOi8vd3d3Lm5ld3NjaWVudGlzdC5jb20vYXJ0aWNsZS8yMzU0ODQ0LWhhY2tlcnMtY2FuLW1ha2UtY29tcHV0ZXJzLWRlc3Ryb3ktdGhlaXItb3duLWNoaXBzLXdpdGgtZWxlY3RyaWNpdHkv0gEA?oc=5

Categories
Computers

Fujitsu: Quantum computers no threat to encryption just yet – The Register

Research conducted by Fujitsu suggests there is no need to panic about quantum computers being able to decode encrypted data – this is unlikely to happen in the near future, it claims.

Fujitsu said it ran trials using its 39-qubit quantum simulator hardware to assess how difficult it would be for quantum computers to crack data encrypted with the RSA cipher, using a Shor’s algorithm approach.

Researchers estimated it would require a fault-tolerant quantum computer with approximately 10,000 qubits and 2.23 trillion quantum gates in order to crack RSA, an achievement that the quantum industry is a long way from reaching. IBM’s Osprey quantum processor, announced in November, has 433 qubits.

Fujitsu said its researchers also estimate that it would be necessary for such a fault-tolerant quantum computer to work on the problem for about 104 days to successfully crack RSA.

However, before anyone gets too complacent, it should be noted IBM’s Osprey has three times the number of qubits that featured in its Eagle processor from the previous year, and the company is aiming to have a 4,158-qubit system by 2025. If it continues to advance at this pace, it may well surpass 10,000 qubits before the end of this decade.

And we’d bet our bottom dollar intelligence agencies, such as America’s NSA, are or will be all over quantum in case the tech manages to crack encryption. Quantum-resistant algorithms are therefore still worth the effort, even if the NSA is ostensibly skeptical of quantum computing’s crypto-smashing powers.

Fujitsu said that although its research indicates the limitations of quantum computing technology preclude the possibility of it beating current encryption algorithms in the short term, the IT giant will continue to evaluate the potential impact of increasingly powerful quantum systems on cryptography security.

“Our research demonstrates that quantum computing doesn’t pose an immediate threat to existing cryptographic methods,” Fujitsu Distinguished Engineer and Senior Director of Data & Security Research Dr Tetsuya Izu said in a statement, but added: “We cannot be complacent either.”

“The world needs to begin preparing now for the possibility that one day quantum computers could fundamentally transform the way we think about security.”

The results will be presented at the 2023 Symposium on Cryptography and Information Security (SCIS 2023) held this week in Kitakyushu City, Japan.

IBM has itself been warning about the dangers posed by the potential of quantum systems, and this month published a Security in the Quantum Era report detailing the need for “quantum-safe” strategies today to maintain the integrity and security of highly sensitive data in the future.

One of the dangers is that adversaries may be harvesting and storing encrypted data now that could still be exploited if and when quantum computers become capable of cracking the cryptography used to protect them.

IBM also launched its z16 mainframe last year with support for “quantum-safe” algorithms in its Crypto Express 8S accelerator subsystem.

Fujitsu unveiled its quantum simulator last year. At launch, it was capable of handling 36-qubit quantum circuits, which required the compute power of a 64-node cluster of PRIMEHPC FX 700 servers, each based on the same 48-core A64FX Arm chip that features in the company’s Fugaku supercomputer system.

The company said it plans to boost performance of the simulator to 40 qubits by April. It also plans to build its own 64-qubit quantum computer in partnership with the RIKEN scientific research institute. ®

Source: https://news.google.com/__i/rss/rd/articles/CBMiQmh0dHBzOi8vd3d3LnRoZXJlZ2lzdGVyLmNvbS8yMDIzLzAxLzI0L2Z1aml0c3VfcXVhbnR1bV9lbmNyeXB0aW9uL9IBRmh0dHBzOi8vd3d3LnRoZXJlZ2lzdGVyLmNvbS9BTVAvMjAyMy8wMS8yNC9mdWppdHN1X3F1YW50dW1fZW5jcnlwdGlvbi8?oc=5

Categories
Computers

Fujitsu: Quantum computers no threat to encryption just yet – The Register

Research conducted by Fujitsu suggests there is no need to panic about quantum computers being able to decode encrypted data – this is unlikely to happen in the near future, it claims.

Fujitsu said it ran trials using its 39-qubit quantum simulator hardware to assess how difficult it would be for quantum computers to crack data encrypted with the RSA cipher, using a Shor’s algorithm approach.

Researchers estimated it would require a fault-tolerant quantum computer with approximately 10,000 qubits and 2.23 trillion quantum gates in order to crack RSA, an achievement that the quantum industry is a long way from reaching. IBM’s Osprey quantum processor, announced in November, has 433 qubits.

Fujitsu said its researchers also estimate that it would be necessary for such a fault-tolerant quantum computer to work on the problem for about 104 days to successfully crack RSA.

However, before anyone gets too complacent, it should be noted IBM’s Osprey has three times the number of qubits that featured in its Eagle processor from the previous year, and the company is aiming to have a 4,158-qubit system by 2025. If it continues to advance at this pace, it may well surpass 10,000 qubits before the end of this decade.

And we’d bet our bottom dollar intelligence agencies, such as America’s NSA, are or will be all over quantum in case the tech manages to crack encryption. Quantum-resistant algorithms are therefore still worth the effort, even if the NSA is ostensibly skeptical of quantum computing’s crypto-smashing powers.

Fujitsu said that although its research indicates the limitations of quantum computing technology preclude the possibility of it beating current encryption algorithms in the short term, the IT giant will continue to evaluate the potential impact of increasingly powerful quantum systems on cryptography security.

“Our research demonstrates that quantum computing doesn’t pose an immediate threat to existing cryptographic methods,” Fujitsu Distinguished Engineer and Senior Director of Data & Security Research Dr Tetsuya Izu said in a statement, but added: “We cannot be complacent either.”

“The world needs to begin preparing now for the possibility that one day quantum computers could fundamentally transform the way we think about security.”

The results will be presented at the 2023 Symposium on Cryptography and Information Security (SCIS 2023) held this week in Kitakyushu City, Japan.

IBM has itself been warning about the dangers posed by the potential of quantum systems, and this month published a Security in the Quantum Era report detailing the need for “quantum-safe” strategies today to maintain the integrity and security of highly sensitive data in the future.

One of the dangers is that adversaries may be harvesting and storing encrypted data now that could still be exploited if and when quantum computers become capable of cracking the cryptography used to protect them.

IBM also launched its z16 mainframe last year with support for “quantum-safe” algorithms in its Crypto Express 8S accelerator subsystem.

Fujitsu unveiled its quantum simulator last year. At launch, it was capable of handling 36-qubit quantum circuits, which required the compute power of a 64-node cluster of PRIMEHPC FX 700 servers, each based on the same 48-core A64FX Arm chip that features in the company’s Fugaku supercomputer system.

The company said it plans to boost performance of the simulator to 40 qubits by April. It also plans to build its own 64-qubit quantum computer in partnership with the RIKEN scientific research institute. ®

Source: https://news.google.com/__i/rss/rd/articles/CBMiQmh0dHBzOi8vd3d3LnRoZXJlZ2lzdGVyLmNvbS8yMDIzLzAxLzI0L2Z1aml0c3VfcXVhbnR1bV9lbmNyeXB0aW9uL9IBRmh0dHBzOi8vd3d3LnRoZXJlZ2lzdGVyLmNvbS9BTVAvMjAyMy8wMS8yNC9mdWppdHN1X3F1YW50dW1fZW5jcnlwdGlvbi8?oc=5

Categories
Computers

Fujitsu: Quantum computers no threat to encryption just yet – The Register

Research conducted by Fujitsu suggests there is no need to panic about quantum computers being able to decode encrypted data – this is unlikely to happen in the near future, it claims.

Fujitsu said it ran trials using its 39-qubit quantum simulator hardware to assess how difficult it would be for quantum computers to crack data encrypted with the RSA cipher, using a Shor’s algorithm approach.

Researchers estimated it would require a fault-tolerant quantum computer with approximately 10,000 qubits and 2.23 trillion quantum gates in order to crack RSA, an achievement that the quantum industry is a long way from reaching. IBM’s Osprey quantum processor, announced in November, has 433 qubits.

Fujitsu said its researchers also estimate that it would be necessary for such a fault-tolerant quantum computer to work on the problem for about 104 days to successfully crack RSA.

However, before anyone gets too complacent, it should be noted IBM’s Osprey has three times the number of qubits that featured in its Eagle processor from the previous year, and the company is aiming to have a 4,158-qubit system by 2025. If it continues to advance at this pace, it may well surpass 10,000 qubits before the end of this decade.

And we’d bet our bottom dollar intelligence agencies, such as America’s NSA, are or will be all over quantum in case the tech manages to crack encryption. Quantum-resistant algorithms are therefore still worth the effort, even if the NSA is ostensibly skeptical of quantum computing’s crypto-smashing powers.

Fujitsu said that although its research indicates the limitations of quantum computing technology preclude the possibility of it beating current encryption algorithms in the short term, the IT giant will continue to evaluate the potential impact of increasingly powerful quantum systems on cryptography security.

“Our research demonstrates that quantum computing doesn’t pose an immediate threat to existing cryptographic methods,” Fujitsu Distinguished Engineer and Senior Director of Data & Security Research Dr Tetsuya Izu said in a statement, but added: “We cannot be complacent either.”

“The world needs to begin preparing now for the possibility that one day quantum computers could fundamentally transform the way we think about security.”

The results will be presented at the 2023 Symposium on Cryptography and Information Security (SCIS 2023) held this week in Kitakyushu City, Japan.

IBM has itself been warning about the dangers posed by the potential of quantum systems, and this month published a Security in the Quantum Era report detailing the need for “quantum-safe” strategies today to maintain the integrity and security of highly sensitive data in the future.

One of the dangers is that adversaries may be harvesting and storing encrypted data now that could still be exploited if and when quantum computers become capable of cracking the cryptography used to protect them.

IBM also launched its z16 mainframe last year with support for “quantum-safe” algorithms in its Crypto Express 8S accelerator subsystem.

Fujitsu unveiled its quantum simulator last year. At launch, it was capable of handling 36-qubit quantum circuits, which required the compute power of a 64-node cluster of PRIMEHPC FX 700 servers, each based on the same 48-core A64FX Arm chip that features in the company’s Fugaku supercomputer system.

The company said it plans to boost performance of the simulator to 40 qubits by April. It also plans to build its own 64-qubit quantum computer in partnership with the RIKEN scientific research institute. ®

Source: https://news.google.com/__i/rss/rd/articles/CBMiQmh0dHBzOi8vd3d3LnRoZXJlZ2lzdGVyLmNvbS8yMDIzLzAxLzI0L2Z1aml0c3VfcXVhbnR1bV9lbmNyeXB0aW9uL9IBRmh0dHBzOi8vd3d3LnRoZXJlZ2lzdGVyLmNvbS9BTVAvMjAyMy8wMS8yNC9mdWppdHN1X3F1YW50dW1fZW5jcnlwdGlvbi8?oc=5

Categories
Computers

Hackers can make computers destroy their own chips with electricity – New Scientist

A feature of server motherboards intended to allow remote updates can be abused to trick the machines into damaging themselves beyond repair

Technology



19 January 2023

A remote hack could make servers fry the chips inside them

canjoena/Getty Images

A flaw in the control systems of server motherboards means they can be tricked into revealing sensitive data to a hacker or even destroying themselves.

A computer’s motherboard, or circuit board, hosts many of its key components and allows communication between them.

Zitai Chen and David Oswald at the University of Birmingham, UK, have found a feature in the Supermicro X11SSL-CF motherboard often used in servers that allowed them to upload their own control software. This can subsequently compromise …

Source: https://news.google.com/__i/rss/rd/articles/CBMicWh0dHBzOi8vd3d3Lm5ld3NjaWVudGlzdC5jb20vYXJ0aWNsZS8yMzU0ODQ0LWhhY2tlcnMtY2FuLW1ha2UtY29tcHV0ZXJzLWRlc3Ryb3ktdGhlaXItb3duLWNoaXBzLXdpdGgtZWxlY3RyaWNpdHkv0gEA?oc=5

Categories
Computers

Quantum Computers And Chinese Whispers: Are Your Bitcoins Safe? – Forbes

I read a whole bunch of stories about a Chinese quantum computer that can crack all of the internet’s security codes in seconds, or something like. I was sceptical, as Arthur Herman wrote here in Forbes, but not because I actually read the research or know anything about how quantum computers work. I was sceptical for a different reason.

To explain what this reason is, I need to take a few minutes of your time to tell you the story of the Zimmerman telegram, a story that is well known to military historians and computer security experts and for very good reasons.

The story begins in World War I, when Britain wanted America to join the fight against the Axis of Edwardian Evil: Germany, the Austro-Hungarian empire and the Ottomans. In 1917, the Kaiser’s ministers had come up with some interesting plans to extend the war o multiple fronts. They wanted to persuade inhabitants of the British (and French) colonies in the Middle East to launch a jihad against the colonial powers and they wanted Mexico to enter the war on the German side with the latter plan intended to divide a potential US war effort.

(At this point, I cannot recommend historian Barbara Tuchman’s 1966 account The Zimmermann Telegram highly enough.)

Portrait of the members of American President Woodrow Wilson’s War Council during WWI, 1918 (Photo … [+] by PhotoQuest/Getty Images).

Getty Images

To execute this dastardly plot, the German Foreign Secretary, Arthur Zimmermann, sent a telegram to the German ambassador in Mexico, Heinrich von Eckardt. The telegram instructed the ambassador to approach the Mexican government with a proposal to form a military alliance against the United States. It specifically promised Mexico the land acquired and paid for by the United States after the US-Mexican War of 1846-48 if the Mexicans helped Germany to win the war. The German ambassador relayed the message but the Mexican president declined the offer.

Naturally, so sensitive a topic demanded an encrypted epistle and it was duly dispatched encoded using the German top secret “0075″ code. As it happens, “0075” was a code that the British had already cracked. Thus, the telegram was intercepted and decrypted enough to get the gist of it to the British Naval Intelligence unit, Room 40. In next to no time, the decoded dynamite was on the desk of the British Foreign Secretary Arthur Balfour, teutonic perfidy laid bare.

Code Cracking Conundrum

Now the British were faced with an interesting problem. How could they use intercepted information to persuade Woodrow Wilson’s government to enter the war in Europe without revealing that there is a security flaw and that you have exploited it? Consider the options:

  • If the British had complained to the Germans about trying to get Mexico into the war, then the Germans would know that the British had the key to their code and they would switch to another code that the British might not be able to break for months, missing much vital military intelligence along the way. What’s more, the Americans would know that the British were tapping their incoming diplomatic traffic, but
  • If they did not reveal the contents, they might miss a the chance to bring America into the war.

The British codebreaker’s innovative solution was to leak the information in such a way as to make it look as if the leak had come from the Mexican telegraph company: since the German relay from Washington to Mexico used a different code, that the Americans already knew to be broken, this was entirely plausible.

If you’re wondering what happened, well despite strong anti-German (and anti-Mexican) feelings in the US, the telegram was believed to be fake news planted by the British to get America to join the war! This theory was bolstered by German and Mexican diplomats as well as the Hearst press empire. However, on March 29th, Zimmermann gave a speech confirming the text of the telegram. On April 2nd, President Wilson asked Congress to declare war on Germany, and on April 6th they complied.

The point of this story is that if you have a means to decode highly secret information, you have to be very careful how you use that information, because if people know that you can decode their highly secret information, they will find a different way of protecting it.

Quantum of Secrecy

What would you do with a quantum computer? I know what I’d do. Never mind national security and the integrity of the banking system, the accountants Deloitte reckon that about four million Bitcoins could be stolen by a quantum computer. With BitcoinBTC
at $20,000 or so, that means billions of dollars is up for grabs. Well worth spending a few billion to build such a device if you are a criminal, well worth spending tens of billions or even hundreds of billions on such a device when Bitcoin has taken over and has become the new digital gold worth $1m each or whatever.

Suppose, for example, that I had invented a quantum computer capable of looting Bitcoin at will. If I get hold of the Satoshi wallet and transfer a couple of billion dollars to myself, my cover will be blown! I’ll have the Elliptic hellhounds on my tail and even if it takes years, they will track me down. Look at what happened to the billions hacked from the Bitfinex exchange in 2016: Last year the US Department of Justice seized $3.6bn and arrested Heather Morgan—aka “Razzlekhan”—and her husband Ilya Lichtenstein for attempting to launder 119,754 bitcoins from the hack.)

Quantum secrecy.

© Helen Holmes (2021).

This is why the story about the Chinese researchers claim that they found a way to break the RSA algorithm (on which much of the internet security solutions depend) using the current generation of quantum computers, years before the technology was expected to pose a threat caused me to react with scepticism.

The researchers central claim in the paper on “Factoring integers with sublinear resources on a superconducting quantum processor” is that they can break the 2048-bit RSA using a 372 quantum bits (qubits) computer.

(IBMIBM
has already said that its 433-qubit Osprey system, the most powerful quantum computer to have been publicly unveiled, will be made available this year.)

When I read this report, I had the same thought as Alexander Martin in The Record: The authors of the paper in question are affiliated with some of China’s most prestigious universities, including several State Key Laboratories which receive direct funding and support from Beijing, and many observers have said that they expected such a breakthrough with such significant security implications would be classified by the Chinese authorities. If the British government has already discovered such an algorithm, I’d hope that they would keep it to themselves for the time being and come up with some Zimmermann-style subterfuges to exploit the ability.

While, as Arthur noted, security experts seem sceptical that this Chinese solution can scale, there is no doubt that code-cracking quantum computers will happen in time of course. Professor John Martinis, who used to be the top scientist in the GoogleGOOG
quantum computing team, says that a system with enough logical qubits to execute powerful algorithms that attack problems that are beyond the capability of classical supercomputers is about a decade away,

Rest assured, if I come across a way to find prime factors in polynomial time using a quantum computer before sooner than that, I can assure you that won’t read about it here in Forbes, or anywhere else or that matter!

Source: https://news.google.com/__i/rss/rd/articles/CBMicWh0dHBzOi8vd3d3LmZvcmJlcy5jb20vc2l0ZXMvZGF2aWRiaXJjaC8yMDIzLzAxLzE5L3F1YW50dW0tY29tcHV0ZXJzLWFuZC1jaGluZXNlLXdoaXNwZXJzLWFyZS15b3VyLWJpdGNvaW5zLXNhZmUv0gF1aHR0cHM6Ly93d3cuZm9yYmVzLmNvbS9zaXRlcy9kYXZpZGJpcmNoLzIwMjMvMDEvMTkvcXVhbnR1bS1jb21wdXRlcnMtYW5kLWNoaW5lc2Utd2hpc3BlcnMtYXJlLXlvdXItYml0Y29pbnMtc2FmZS9hbXAv?oc=5

Categories
Computers

More than 500 laid off after virus disables computers at Pa. wood cabinet plant – PennLive

KREAMER-More than 500 Wood-Mode workers have been laid off temporarily due to a massive computer problem at the Snyder County custom wood cabinet manufacturer.

A virus that is believed to have originated overseas hit the company Monday affecting production and deliveries, owner Bill French said.

Experts who are working to rectify the issue expect it will take two weeks, he said Friday. The laid-off employees have been encouraged to file for unemployment benefits, he said.

Only about 20 of the 550 employees remain on the job helping to get the system back up, said French, a Mifflinburg businessman who established the existing Wood-Mode as a new company in August 2019.

Because of a price increase previously announced to take effect Monday, the same day as the computer outage, there is a large backlog of orders, he said.

The price increase has been delayed because of the issue, he said.

Besides getting rid of the virus, French said additional software is being installed to try to prevent a recurrence.

Production and deliveries will return to normal immediately after the computer system is back up, he said.

This is the second time under French’s ownership that plant production has been shut down. The first was March 20, 2020, when during the COVID-19 pandemic Gov. Wolf ordered all non-essential businesses to close.

About a month later, the governor granted Wood-Mode a waiver to complete urgent orders.

The former Wood-Mode that had been in business for 77 years closed abruptly on May 13, 2019, throwing 938 out of work.

Employment has increased steadily from the 100 working when the existing Wood-Mode began production in 2019.

Source: https://news.google.com/__i/rss/rd/articles/CBMieWh0dHBzOi8vd3d3LnBlbm5saXZlLmNvbS9uZXdzLzIwMjMvMDEvbW9yZS10aGFuLTUwMC1sYWlkLW9mZi1hZnRlci12aXJ1cy1kaXNhYmxlcy1jb21wdXRlcnMtYXQtcGEtd29vZC1jYWJpbmV0LXBsYW50Lmh0bWzSAYgBaHR0cHM6Ly93d3cucGVubmxpdmUuY29tL25ld3MvMjAyMy8wMS9tb3JlLXRoYW4tNTAwLWxhaWQtb2ZmLWFmdGVyLXZpcnVzLWRpc2FibGVzLWNvbXB1dGVycy1hdC1wYS13b29kLWNhYmluZXQtcGxhbnQuaHRtbD9vdXRwdXRUeXBlPWFtcA?oc=5

Categories
Computers

Apple could bring once-abhorred touchscreens to computers in 2025: report – MarketWatch

Apple Inc.
AAPL,
-0.06%
is working on making touch-screen Macs that could roll out in 2025, Bloomberg reported on Wednesday, citing sources familiar with the matter. Under those plans, which could still change, such a rollout could come as part of a bigger update to the MacBook Pro, according to Bloomberg, which noted that Macs have brought in more sales for Apple than iPads over the past several years. The possible move comes after Apple’s rivals have rolled out computer touchscreens, and despite opposition from the company’s late co-founder, Steve Jobs, Bloomberg noted. A day earlier, Bloomberg reported that Apple was planning on making screens for some mobile devices on its own as soon as next year. Shares of Apple were largely unchanged after hours.

Source: https://news.google.com/__i/rss/rd/articles/CBMidmh0dHBzOi8vd3d3Lm1hcmtldHdhdGNoLmNvbS9zdG9yeS9hcHBsZS1jb3VsZC1icmluZy1vbmNlLWFiaG9ycmVkLXRvdWNoc2NyZWVucy10by1jb21wdXRlcnMtaW4tMjAyNS1yZXBvcnQtMDE2NzM0NzQ1MjXSAXpodHRwczovL3d3dy5tYXJrZXR3YXRjaC5jb20vYW1wL3N0b3J5L2FwcGxlLWNvdWxkLWJyaW5nLW9uY2UtYWJob3JyZWQtdG91Y2hzY3JlZW5zLXRvLWNvbXB1dGVycy1pbi0yMDI1LXJlcG9ydC0wMTY3MzQ3NDUyNQ?oc=5

Categories
Computers

Apple could bring once-abhorred touchscreens to computers in 2025: report – MarketWatch

Apple Inc.
AAPL,
-0.06%
is working on making touch-screen Macs that could roll out in 2025, Bloomberg reported on Wednesday, citing sources familiar with the matter. Under those plans, which could still change, such a rollout could come as part of a bigger update to the MacBook Pro, according to Bloomberg, which noted that Macs have brought in more sales for Apple than iPads over the past several years. The possible move comes after Apple’s rivals have rolled out computer touchscreens, and despite opposition from the company’s late co-founder, Steve Jobs, Bloomberg noted. A day earlier, Bloomberg reported that Apple was planning on making screens for some mobile devices on its own as soon as next year. Shares of Apple were largely unchanged after hours.

Source: https://news.google.com/__i/rss/rd/articles/CBMidmh0dHBzOi8vd3d3Lm1hcmtldHdhdGNoLmNvbS9zdG9yeS9hcHBsZS1jb3VsZC1icmluZy1vbmNlLWFiaG9ycmVkLXRvdWNoc2NyZWVucy10by1jb21wdXRlcnMtaW4tMjAyNS1yZXBvcnQtMDE2NzM0NzQ1MjXSAXpodHRwczovL3d3dy5tYXJrZXR3YXRjaC5jb20vYW1wL3N0b3J5L2FwcGxlLWNvdWxkLWJyaW5nLW9uY2UtYWJob3JyZWQtdG91Y2hzY3JlZW5zLXRvLWNvbXB1dGVycy1pbi0yMDI1LXJlcG9ydC0wMTY3MzQ3NDUyNQ?oc=5