Best of LinkedIn: ICT & Tech Insights CW 15/ 16

Show notes

We curate most relevant posts about ICT & Tech Insights on LinkedIn and regularly share key takeaways. We at Frenus support ICT enterprises with precise market and pricing intelligence that goes beyond traditional analyst subscriptions and existing databases, delivering actionable insights for better decision-making. You can find more info here: https://www.frenus.com/usecases/filling-the-strategic-gaps-your-current-intelligence-sources-leave-open

This edition examines the rapid intersection of quantum computing, artificial intelligence, and cybersecurity as they move from theoretical research into industrial reality. Experts describe quantum technology as being in a “Wright Brothers phase,” with early demonstrations in drug discovery and materials science showing that problems previously impossible for classical systems can now be approached.This progress also introduces urgent risks, particularly Q-Day, the point at which quantum hardware may break current encryption standards. As a result, there is strong emphasis on adopting quantum-resistant cryptography and establishing robust AI governance to protect digital infrastructure. Practical insights highlight that successful digital transformation depends more on human-centric leadership, sovereign cloud strategies, and clear risk management than on tools alone. At the same time, AI-driven threats are accelerating attack timelines, while core principles such as networking fundamentals and strong identity hygiene remain the most critical defenses for modern organizations.

This podcast was created via Google NotebookLM.

Show transcript

00:00:00: This episode is provided by Thomas Alguyer and Frennis, based on the most relevant LinkedIn posts about ICT and tech insights from CW-Fifteen and Sixteen.

00:00:08: Frennes supports ICT enterprises in the form of delivering precise ICT market and pricing intelligence that analyst subscriptions and existing databases cannot provide.

00:00:18: you can find more info in the description.

00:00:21: Welcome learner to The Deep Dive!

00:00:23: I mean imagine a single day where standard two hundred fifty six bit encryption Basically, the mathematical lock that protects everything from global banking to national secrets down your private messages just ceases to work.

00:00:36: Which is a terrifying

00:00:37: thought!

00:00:38: Right and we used think day was you know decade or more away But based on the sources we're looking at today, We might literally have less than five years.

00:00:46: Yeah that timeline compression is just.

00:00:47: it's staggering.

00:00:48: and well It's a perfect example of what were tackling Today?

00:00:51: We've curated The most vital perspectives shared by ICT and tech professionals across LinkedIn in calendar weeks fifteen And sixteen.

00:00:57: exactly.

00:00:58: no fluff

00:00:59: right.

00:00:59: zero fluff or cutting straight to three massive shifts.

00:01:03: First, how quantum computing is finally moving out of the lab and into real use cases.

00:01:09: Second why cyber security has become this terrifying challenge of speed in governance.

00:01:14: And finally How to stop treating cyber as a cost center?

00:01:19: Start using it as an actual foundation for digital transformation.

00:01:23: I think that overarching theme connecting all these insights Is really about mechanism Like, we aren't just looking at what is happening in the tech sector.

00:01:30: We're going to explore exactly how and why these underlying systems are actually changing.

00:01:35: Okay let's unpack this!

00:01:41: Joseph Michael recently made this great post comparing our current moment to the Wright Brothers phase of quantum.

00:01:46: Like we're looking at these super fragile experimental machines, but the leap from that first awkward flight to say crossing The Atlantic it's going to happen in a blink of an eye.

00:01:58: It really is and part of reason I feel so sci-fi just because the terminology So dense right?

00:02:02: yeah

00:02:02: Oh definitely its totally inaccessible for most people.

00:02:05: Yeah.

00:02:05: But Matthias Troyer shared This incredible guide Recently.

00:02:09: That translates quantum behavior into a dance metaphor, which I love.

00:02:14: Oh the flash mob thing?

00:02:15: Yes.

00:02:16: So if you look at classical computing bits they're basically like individual dancers in a room.

00:02:21: You tell them to stand perfectly still Which is zero.

00:02:24: or Take one rigid step forward, which is a one right They operate entirely independently of each other.

00:02:31: so it's this very binary Sequential process.

00:02:34: you can really only evaluate one outcome at a time

00:02:37: exactly.

00:02:38: But a quantum computer uses quibbits and Troyer compares quibits to a synchronized flash mob.

00:02:44: Okay,

00:02:45: instead of standing still or taking a step through this choreographed ensemble moving together in the continuous flow that's superposition.

00:02:52: so they aren't just zero or

00:02:54: one.

00:02:54: yeah They're holding multiple mathematical possibilities open simultaneously.

00:02:58: Just you know twirling and dipping is one massive wave of motion.

00:03:01: The outcome depends entirely on how the individual dancers relate To the movements of everyone else around them.

00:03:07: Wait,

00:03:08: I'm getting stuck here though.

00:03:09: If quibits are like a flash mob doing...I don't know..a hundred million dances at once holding all those possibilities how do you actually extract one mathematical answer from that chaos?

00:03:21: Yeah!

00:03:21: That's the big question.

00:03:22: Because

00:03:23: if you observe it to get an answer doesn't ruin your dance.

00:03:26: It does…that is the core challenge of quantum mechanics but solved through a concept called interference.

00:03:32: Because these quibits act like waves, you can manipulate them so that the wrong answers destructively interfere with each other.

00:03:40: Oh wait kind of high-end noise canceling headphones?

00:03:43: Yes!

00:03:43: That is a fantastic analogy.

00:03:46: Like your headphones take the ambient sound wave and they literally create an inverse wave to cancel it out Right

00:03:51: leaving only music you actually want hear.

00:03:53: Exactly So in a quantum computer The algorithms are designed to create destructive interference for all incorrect mathematical paths while simultaneously creating constructive interference, basically amplifying the signal for the correct path.

00:04:07: So the right answer literally just emerges from the noise.

00:04:10: Wow!

00:04:11: That's wild.

00:04:13: but keeping that wave stable requires extreme engineering.

00:04:16: Dr.

00:04:16: Rabi Ranjan Prasad Khan shared an image of what these systems actually look like now and it is...

00:04:22: They Look Like Art Pieces.

00:04:23: They really do.

00:04:24: It's this towering gold chandelier suspended inside a cylindrical vacuum chamber and it's cooled to negative two hundred seventy three degrees Celsius,

00:04:33: which is absolute zero right?

00:04:35: It's literally colder than the ambient temperature of outer space.

00:04:39: Yeah And the reason for that extreme cold goes right back to our flash mob analogy heat Is just atomic motion.

00:04:45: ah okay.

00:04:46: so if you introduce even a tiny bit of thermal energy The dancers get bumped.

00:04:51: A stray photon or even a slight vibration causes something called decoherence.

00:04:55: Yeah,

00:04:55: then the dance gets ruined?

00:04:56: Exactly!

00:04:57: The quantum state collapses and you just lose the calculation entirely.

00:05:00: So how do we actually control this system that is that fragile?

00:05:03: because I mean... Human engineers can't manually tweak millions of microscopic variables in real time.

00:05:09: We absolutely can, and that leads to this massive paradigm shift that Tarek H highlighted recently regarding NVIDIA's new Ising model.

00:05:17: Ising Model?

00:05:17: Yeah!

00:05:18: To define the term an Ising is a mathematical framework originally used in physics to understand magnetic fields but it turns out its incredibly useful for mapping complex optimization problems.

00:05:30: Okay so how does that tie into NVIDia?

00:05:33: Well, Perik points out that artificial intelligence is no longer just a software application sitting on top of compute power.

00:05:40: AI's actually starting to become the control layer for the computer itself.

00:05:44: Wait really?

00:05:45: So the AI is the operator!

00:05:47: Exactly.

00:05:48: NVIDIA and others are using deep learning AI to calibrate this incredibly fragile quantum hardware.

00:05:54: The AI monitors the noise, adjusts the easing models and performs the error correction in real time.

00:06:00: Oh wow!

00:06:01: So we're deploying our most advanced software to stabilize the most fragile, advanced hardware that's ever built?

00:06:06: You nailed it...it is a complete loop

00:06:08: Which means Quantum is rapidly moving out of those isolated absolute zero gold chandeliers like out into the wild.

00:06:14: Yeah..the real world.

00:06:16: Jan Michelin posted this unbelievable update about a train operating in London right now that actually uses quantum inertial navigation.

00:06:23: Yeah, it blew my mind!

00:06:24: Right?

00:06:24: No GPS satellites no external signals at all

00:06:27: which is just huge leap for infrastructure resilience.

00:06:30: because you know classical sensors always experience drift.

00:06:33: if you lose gps your classical internal sensors slowly accumulate these tiny mathematical errors until the system thinks a mile away from where it actually is.

00:06:44: Let me push you on the mechanics there though, how do cold atoms actually measure the motion of a train?

00:06:49: So at temperatures near absolute zero, atoms stop behaving purely like particles and they start acting like waves.

00:06:55: okay

00:06:56: when you drop these ultra-cold atoms inside a sensor on a moving train any acceleration or rotation of the train shifts the interference pattern of those atomic waves

00:07:05: going back to the waves right.

00:07:07: And by measuring that shift, you can calculate the exact motion of the train based on fundamental laws of physics.

00:07:13: It doesn't drift it's absolute!

00:07:14: That is so cool.

00:07:15: and we're taking that absolute precision into the software layer too.

00:07:19: Tilak Mitra recently discussed an architecture he calls QAOS...that's Quantum Agendic Operating System.

00:07:25: Right combining quantum with AI agents Exactly

00:07:28: He's combining the massive pattern recognition power of quantum computing With autonomous AI agents.

00:07:35: This where really start tackling global scale problems.

00:07:38: Yeah, like think about systemic financial contagion a classical computer just cannot process the billions of real-time variables in global markets fast enough to say see a crash coming before it happens

00:07:50: because is too sequential.

00:07:51: right but a quantum system can evaluate that massive wave of variable simultaneously and once the quantum systems spots the anomaly it hands the coordinates to an autonomous AI agent.

00:08:03: Which is where speed comes

00:08:04: in?

00:08:04: Exactly!

00:08:05: The Agent then instantly executes a quarantine protocol or market freeze.

00:08:09: before human analysts even has time click refresh on their dashboard,

00:08:13: which is incredible capability.

00:08:14: but and this bridges us perfectly into our second theme that exact same computational power capable of seeing through noise.

00:08:21: global finance currently being pointed directly at standard encryption protocols.

00:08:26: the dark side of the speed.

00:08:28: Exactly, The Speed Of Technology is fundamentally breaking how we govern cybersecurity.

00:08:33: Right because if quantum can solve the unsolvable it can certainly unlock the unlockable

00:08:38: And the timeline for that is shrinking way faster than people thought.

00:08:42: Dominic Keegan and Deirdre Connolly brought forward some pretty sobering realities based on recent papers from Google and the startup Oratomic alongside insights from cryptography engineer Filippo Valforda.

00:08:54: Okay what do they say?

00:08:55: They're warning us about Q-Day.

00:08:57: Yeah, the specific day when a quantum computer successfully breaks standard two hundred and fifty six bit encryption.

00:09:03: just to ground this for you listening Two hundred fifty six bid encryption is the mathematical lock on literally everything it secures.

00:09:10: our VPNs Our banking transactions are digital identities.

00:09:14: It's the foundation of internet trust

00:09:16: right?

00:09:17: And for a long time qday was dismissed as You know a problem for the twenty forties.

00:09:22: The assumption was that you needed millions of physical quibits to do

00:09:25: it.

00:09:25: Okay, physical qubits versus...

00:09:27: Yeah we need a distinguish between physical and logical quibit here.

00:09:29: A physical qubit is the actual hardware component which re-established as highly prone errors.

00:09:34: The bumped dancers?

00:09:35: Exactly!

00:09:38: is a stable, error-free unit of computation created by bundling thousands of physical quibits together and using software to correct their mistakes.

00:09:47: So you need this massive pile of physical hardware just to get a few reliable logical quibbits?

00:09:51: That was the old math.

00:09:52: yeah but Google recently revised down the number of logical quubits required to break encryption curves or atomic published research suggesting they could achieve those necessary logical quibits using as few as ten thousand physical quibitz.

00:10:07: Wow!

00:10:07: So according to these experts, Q-Day might arrive by twenty twenty nine or the early twenty thirties?

00:10:13: Twenty

00:10:13: twenty... I mean that's basically tomorrow in enterprise timelines

00:10:16: It really is.

00:10:17: The average enterprise needs twelve to fifteen years to discover all their legacy cryptography, rip it out and fully migrate to post-quantum standards.

00:10:29: Twelve to

00:10:30: fifteen.

00:10:33: And what's crazy is while enterprises are facing the slow-moving quantum avalanche, they're simultaneously dealing with the hyperspeed of AI threats right now.

00:10:43: Wendy Whitmore made this incredibly clear in a recent post.

00:10:46: Oh her post was great.

00:10:47: Yeah she noted that the sheer speed of cyber attacks has elevated security from basic IT problem to a full-blown executive leadership issue.

00:10:56: Because the vulnerability window has just completely collapsed?

00:10:59: Exactly, it used to take weeks for a vulnerability to go from being disclosed on a forum to being actively exploited in The Wild but now attackers are using AI to automate the discovery and exploitation phase.

00:11:12: It takes hours.

00:11:14: Hours Yeah!

00:11:15: And Wendy argues that any manual triage like security analyst having call of VP asking permission server is just a fatal bottleneck.

00:11:24: If you rely on human reaction time,

00:11:29: I

00:11:46: love this study.

00:11:47: When ABS was introduced, regulators assumed accident rates would just plummet right?

00:11:52: Because the brakes were objectively superior

00:11:54: But the accident rate held completely steady because

00:11:57: of risk homeostasis

00:11:58: Exactly!

00:11:59: The drivers intuitively knew they had better breaks.

00:12:02: so instead of driving safely They drove faster...they followed cars in front more closely.

00:12:08: The technological safety net didn't reduce overall risks.

00:12:11: It just incentivized more reckless human behavior.

00:12:14: Okay, here's where it gets really interesting because applying that to software development is deeply concerning.

00:12:20: Are we saying that developers using AI coding assistance are acting like taxi drivers with ABS?

00:12:25: That is the exact parallel Jane Franklin makes.

00:12:28: AI tools, co-pilot or providing massive speed gains for software developers.

00:12:32: they can write and deploy code faster than ever before right but instead of using that save time to test their code in ship a more secure product.

00:12:40: They're applying one hundred percent of that efficiency toward just shipping more volume.

00:12:45: Wow So they're driving recklessly in the fog because they assume that AI tools will catch their mistakes.

00:12:50: Yeah, They build incredibly fast assuming they can patch it later.

00:12:54: but The cyber risk hasn't disappeared.

00:12:56: It's just been relocated directly into live production environments which are often unpatched and unmonitored.

00:13:02: so wait if our developers Are flooding the zone with vulnerable code?

00:13:06: And Our attackers are using AI to exploit it In hours!

00:13:10: Our standard ways of measuring Cyber Risk must be fundamentally broken.

00:13:15: I mean, if i look at a standard corporate risk matrix right now is it even telling me the truth?

00:13:20: Well Luke Irwin tackled this exact question.

00:13:22: He pointed out that most corporate cyber-risk assessments still rely on a static five by five matrix You know plotting the likelihood of an event against its impact using those green yellow and red zones.

00:13:33: Oh yeah The classic heat map every consultant uses.

00:13:36: But

00:13:36: luke argues This model completely fails for cybersecurity.

00:13:40: A Five By Five Matrix Is Designed For Static probabilistic risks, like a flood or fire.

00:13:45: Right!

00:13:46: A Flood doesn't actively scan your sandbags looking for weakness

00:13:49: Exactly.

00:13:50: But cyber risk is adversarial.

00:13:53: You are fighting human enemy equipped with AI.

00:13:56: When the threat landscape moves this fast every single vulnerability eventually plots into top right hand red corner of heat map.

00:14:04: And when everything's Red?

00:14:06: The Matrix is useless.

00:14:08: It can tell CIO where to actually spend their budget

00:14:11: which brings us to our final theme.

00:14:13: Because if the standard risk matrix is useless and just buying more AI tools creates this risk homeostasis, how does an organization actually survive?

00:14:23: It

00:14:23: requires a massive pivot.

00:14:24: Yeah we have to shift from treating cyber as an IT cost center To viewing it as strategic architectural investment tied directly to digital transformation

00:14:34: And Oaken Yildiz and Marcel Velika made a really compelling case for this.

00:14:37: They pointed out that the industry is frankly obsessed with chasing the shiny new AI security vendor, but real senior level resilience requires mastering the absolute fundamentals of network architecture.

00:14:49: We're talking about the actual plumbing of the internet here.

00:14:51: Yes we are talking about mastering DNS The Domain Name System That Acts as the Internet's Phone Book.

00:14:57: We're talking about rigorous routing protocols and strict network segmentation, right?

00:15:03: If you don't understand how data physically flows through your Network architecture buying an advanced AI threat detection tool is just going to give You faster louder alarms for a basement that has already flooding.

00:15:16: And this focus on architectural fundamentals rather than just shiny technology is exactly what separates successful digital transformations from catastrophic failure.

00:15:25: Oh, one

00:15:25: hundred percent!

00:15:26: We actually have two contrasting case studies from the sources that illustrate this perfectly.

00:15:31: let's look at the failure first.

00:15:33: Sundar Vargays revisited the massive collapse of Target Canada.

00:15:37: Yeah those huge story.

00:15:38: they tried to expand across the border and went fully digital on day one.

00:15:42: right.

00:15:42: They deployed modern ERP systems, enterprise resource planning platforms which essentially act as the central nervous system connecting inventory sales supply chains all of it and they deploy these at a massive scale.

00:15:54: It was a disaster!

00:15:55: A five billion dollar exit empty shelves phantom inventory completely broken logistics.

00:16:03: But why did the ERP fail so spectacularly?

00:16:06: Because the software itself wasn't broken.

00:16:08: no The software worked exactly is designed.

00:16:11: The failure was a total lack of human readiness and data governance.

00:16:15: They treated digital transformation purely as a technology deployment, they fed inaccurate measurements in bad legacy data into a hyper-fast ERP system... And the system just processed their bad data at lightning speed perfectly executing supply chain collapse.

00:16:31: Now contrast that failure with Wesley Eugene's insight from his time as CIO at the design firm IDEO.

00:16:40: Wesley admitted that when he first tried to run digital transformation based purely on implementing new technology, it failed.

00:16:46: When he tried to running it based strictly on business strategy... It also failed!

00:16:49: His transformation only succeeded when he stopped talking about systems entirely and anchored every single technology decision-to-human experience.

00:16:56: The client experienced the employee experience in team experience

00:17:00: Exactly That Every new tool, every ERP module had to demonstrably serve humans using it.

00:17:07: By shifting the lens to human experience, they successfully deployed massive global systems across three continents in just twenty-four months.

00:17:15: It's like building a bullet train!

00:17:17: I mean digital transformation isn't just buying faster cars.

00:17:20: it is upgrading your entire organization into high speed rail network.

00:17:24: Target Canada proved that if you buy the bullet train but refuse lay down new tracks The human readiness data governance culture The whole thing just derails the second it leaves this station.

00:17:35: Exactly,

00:17:36: you can't hand over keys to a hypercar without driver's ed.

00:17:40: But laying down those tracks requires level of governance that most enterprises frankly aren't prepared for.

00:17:45: When people hear governance they think of compliance checklists which puts half board room asleep

00:17:49: but shouldn't because stakes are evolving rapidly.

00:17:54: Robbie Jay brought forward profound insight regarding tribal data sovereignty That I completely refrains how we should view enterprise governance.

00:18:01: Yeah, I found this fascinating.

00:18:03: What does a tribal sovereignty model teach a corporate enterprise?

00:18:07: Well for Tribal IT and cybersecurity leaders.

00:18:10: data sovereignty isn't a box to check on an audit.

00:18:13: Robbie points out that when a vendor comes in tribal leaders engage in a treaty adjacent conversation.

00:18:19: Okay

00:18:20: They don't just ask if the date is encrypted.

00:18:21: they asked who has ultimate authority over this data?

00:18:26: under what specific legal frameworks doesn't reside?

00:18:30: If your vendor gets acquired by a foreign entity, what happens to our sovereign history?

00:18:35: That is a fundamental shift in posture.

00:18:37: It's literally two sovereign entities negotiating authority not just a customer buying a sauce subscription

00:18:42: Exactly and Rami argues that as enterprise AI models scale up and start consuming all the corporations internal data every organization needs to start having these treaty level conversations.

00:18:52: Are

00:18:52: vendors even ready for

00:18:53: that?

00:18:54: Vendors aren't prepared But you cannot hand over the keys to your entire digital infrastructure without maintaining absolute strategic control over the data that feeds it.

00:19:04: Because if you lose control of the data, the AI models degrade The ERP systems fail and You basically loose control of company.

00:19:13: That is core.

00:19:14: True resilience requires translating highly complex technical risks like quantum decryption or AI data consumption into human behavior and business strategy.

00:19:24: Which is really hard to do!

00:19:26: It IS, and McTherick Koker reinforced this brilliantly.

00:19:29: She stated that cybersecurity desperately needs translators.

00:19:32: We need leaders who can take dense technical policies And turn them in actual behaviour change on the floor.

00:19:37: Right

00:19:38: Because when people understand mechanics of risk Behaviour changes.

00:19:42: And when behavior changes, security stops being a bottleneck and actually becomes organizational culture.

00:19:48: If we connect this to the bigger picture that's what true digital transformation looks

00:19:52: like.".

00:20:01: If quantum computing and autonomous AI agents are driving the speed of technology to a point where human reaction time is literally irrelevant, where attacks happen in minutes.

00:20:18: And defenses must be entirely automated... Perhaps the ultimate cybersecurity measure isn't technological tool at all?

00:20:25: Because tools will always by bypassed eventually!

00:20:27: Right!

00:20:28: Maybe the only way to survive the hyperspeed of future is fundamental rewiring organizational psychology & human trust.

00:20:35: The technology is going to move faster than our biology can process, so are human foundation or architecture.

00:20:41: Our data governance and our culture has to be completely unshakable.

00:20:45: that Is a phenomenal problem them all over?

00:20:48: We have covered a massive amount of ground today, really pulling the mechanics out.

00:21:14: Keep learning, keep questioning and we will catch you on the next one.

New comment

Your name or nickname, will be shown publicly
At least 10 characters long
By submitting your comment you agree that the content of the field "Name or nickname" will be stored and shown publicly next to your comment. Using your real name is optional.