Learning objective
To analyze the conceptual foundations of quantum computing, artificial intelligence, and institutional trajectories, and to examine applications, controversies, and orphan elements in contemporary technology.
CONCEPTUAL FOUNDATIONS
[F1] Quantum computer (computadora cuántica: máquina que usa qubits) is a device that manipulates quantum states to perform probabilistic computation. Unlike a classical computer (computadora clásica: máquina de bits) that processes deterministic binary signals, a quantum computer leverages superposition and entanglement. Qubits (qubits: unidades de información cuántica) may represent 0 and 1 simultaneously until measured, introducing probabilistic outcomes. This capacity explains why quantum computation is positioned as revolutionary for certain classes of problems.
[F2] Distributed denial of service (ataque DDoS: ataque de denegación de servicio distribuido) is a coordinated assault where multiple devices overwhelm a server. Unlike ordinary high traffic, DDoS floods resources intentionally to deny legitimate access. Cybersecurity strategies, such as those implemented by Cloudflare, provide layered defenses against these events. These attacks illustrate the importance of resilient digital infrastructure. Institutions increasingly consider them critical threats to continuity.
[F3] Penetration testing (pentesting: prueba de penetración) is a controlled process where authorized experts simulate malicious attacks. The aim is to identify vulnerabilities before adversaries exploit them. Pentesting operates as both a technical practice and a regulatory requirement in many industries. Chema Alonso has explicitly connected pentesting with artificial intelligence research. This relationship exemplifies the fusion of practical security and emerging computational paradigms.
[F4] Generative artificial intelligence (GenAI: inteligencia artificial generativa) is an algorithmic class that produces novel data resembling human-created content. Examples include large language models capable of conversation and image generators creating new visuals. GenAI raises security concerns, motivating specialized pentesting methods. Publications such as “Hacking & Pentesting con Inteligencia Artificial” emphasize both risks and opportunities. Institutions must address misuse while leveraging creative potential.
[F5] Quantum and post-quantum security (seguridad cuántica y poscuántica: protección contra amenazas de computación cuántica) studies cryptographic resilience in an era where quantum machines threaten classical keys. Institutions such as the Universidad de Deusto organize training on this topic. Publications dedicated to this field highlight both theoretical algorithms and applied countermeasures. The field balances urgent defensive needs with speculative research trajectories. International collaboration remains central to its advancement.
[F6] IBM Watson (IBM Watson: plataforma de inteligencia artificial empresarial) is a set of cloud-based services focusing on domain-specific data analysis. Unlike ChatGPT (ChatGPT: modelo de lenguaje generativo), which offers general conversational capabilities, Watson is specialized and trained on medical, financial, or corporate datasets. Comparisons between Watson and ChatGPT reveal the distinction between specialist and generalist design. Both exemplify divergent philosophies in artificial intelligence deployment. Their coexistence illustrates the spectrum of contemporary AI systems.
APPLICATIONS AND CONTROVERSIES
[A1] Cloudflare (Cloudflare: empresa de ciberseguridad e infraestructura) represents institutional innovation in defending against distributed denial of service and optimizing content delivery networks. The integration of experts such as Chema Alonso into leadership roles underscores the relevance of experienced practitioners. Cloudflare exemplifies how private institutions shape both local and global security landscapes. Its role extends beyond technical provision to influence international development strategies.
[A2] Europa Press (Europa Press: agencia de noticias española) illustrates the diversification of expertise when cybersecurity leaders join media institutions. The presence of Chema Alonso on its board reflects cross-sector influence between technology and journalism. This participation highlights the intersection of information dissemination and technological governance. Such institutional overlap raises debates about neutrality, strategic communication, and innovation. The development demonstrates how digital expertise penetrates traditional sectors.
[A3] Pharmaceutical discovery represents a specific case where quantum computers may surpass classical computation. Simulation of molecular interactions, particularly proteins such as KRAS, has been advanced using IBM quantum hardware. Research documented inhibitors with measurable biological activity, though no medication has yet been fully approved through quantum-only design. Institutions such as Google Quantum AI, Roche, and XtalPi further develop molecular simulations. These examples demonstrate concrete yet emergent applications.
[A4] IBM (IBM: International Business Machines Corporation) transitioned from consumer-visible products to enterprise-oriented services. Historical milestones include the System/360 in 1964, the IBM PC in 1981, and the sale of the PC division to Lenovo in 2005. In the current era, IBM prioritizes supercomputing, cloud services, consulting, and quantum computing. Its presence remains tangible in scientific infrastructure though less visible to consumers. This trajectory underscores strategic adaptation to changing technology landscapes.
[A5] Orphan elements include MyPublicInbox (MyPublicInbox: plataforma de contacto profesional), Universidad de Deusto (universidad española), 0xWord (editorial técnica), and legal identifiers from corporate communications. MyPublicInbox enables direct professional messaging, while 0xWord publishes specialized works in cybersecurity and artificial intelligence. Corporate legal notices provide regulatory transparency but are peripheral to core technology themes. These elements contextualize the institutional ecosystem surrounding public figures and companies. Their integration ensures no omission in academic analysis.
[A6] Acertijos lógicos (logical riddles: problemas de razonamiento sin matemáticas) function as illustrations of reasoning limitations in both human and artificial systems. Examples include the surgeon paradox, the elevator puzzle, and the two-guard problem. These scenarios demonstrate cognitive biases, such as gender stereotypes or architectural assumptions. Their analysis reveals how interpretive frameworks affect conclusions. Artificial intelligence systems, like humans, may misinterpret due to training data or heuristic shortcuts.
Sources
- Alonso, Chema. Hacking & Pentesting con Inteligencia Artificial. 0xWord, 2025, book.
- IBM Quantum. “IBM Quantum Experience.” IBM, 2023, online platform.
- Google Quantum AI and Roche. “Molecular Simulation Research.” Google Research, 2022, report.
- XtalPi. “Drug Discovery with Quantum Algorithms.” XtalPi, 2021, corporate publication.
- Cloudflare. “DDoS Attack Trends.” Cloudflare, 2023, technical report.
- Europa Press. “Corporate Governance Announcement.” Europa Press, 2025, press release.
- Universidad de Deusto. “Quantum and Post-Quantum Security Training.” Universidad de Deusto, 2025, program description.