Quantum Computer Systems Design I: Intro to Quantum Computation and Programming
About this Course
This quantum computing course explores the basic design principles of today's quantum computer systems. In this course, students will learn to work with the IBM Qiskit software tools to write simple programs in Python and execute them on cloud-accessible quantum hardware. Topics covered in this course include: Introduction to systems research in quantum computing Fundamental rules in quantum computing, Bloch Sphere, Feynman Path Sum Sequential and parallel execution of quantum gates, EPR pair, no-cloning theorem, quantum teleportation Medium-size algorithms for NISQ (near-term intermediate scale quantum) computers Quantum processor microarchitecture: classical and quantum control Quantum program compilation and qubit memory management Keywords: quantum computing, computer science, linear algebra, compiler, circuit optimization, python, qiskit, quantum algorithms, quantum technology, superposition, entanglement, qubit technology, superconducting qubit, transmon qubit, ion-trap qubit, photonic qubit, real quantum computersCreated by: University of Chicago
Level: Advanced

Related Online Courses
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
Employing monitoring and observability solutions are crucial skills for Software Developers and DevOps professionals to ensure continuous uptime and delivery for their applications. Monitoring is... more
Este curso trata la Teoría de Grafos desde el punto de vista de la modelización, lo que nos permitirá con posterioridad resolver muchos problemas de diversa índole. Presentaremos ejemplos de los... more
Every day, our computers and phones correct our spelling, curate our social media, or translate news articles for us. But have you ever wondered how these applications work on a basic level? It... more
With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across... more