{"id":4707,"date":"2024-03-12T16:59:00","date_gmt":"2024-03-12T15:59:00","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/"},"modified":"2025-01-16T18:30:20","modified_gmt":"2025-01-16T17:30:20","slug":"which-alternative-computer-architectures-are-conceivable","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/","title":{"rendered":"What alternative computer architectures are conceivable?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>Cyberagentur awards preliminary study to Berlin<\/strong><\/h2>\n<div class='ce-spacer'><\/div>  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n    <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie-1024x683.png\" class=\"attachment-large size-large\" alt=\"Cyberagentur vergibt Auftrag zu Vorstudien f\u00fcr Alternative Rechnerarchitekturen.\" srcset=\"\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie-1024x683.png 1024w, \/wp-content\/uploads\/2024\/08\/ARA-Vorstudie-330x220.png 330w, \/wp-content\/uploads\/2024\/08\/ARA-Vorstudie-768x512.png 768w, \/wp-content\/uploads\/2024\/08\/ARA-Vorstudie-512x341.png 512w, \/wp-content\/uploads\/2024\/08\/ARA-Vorstudie.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Cyberagentur vergibt Auftrag zu Vorstudien f\u00fcr Alternative Rechnerarchitekturen.<\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has awarded a contract for a preliminary study for the research project &#8220;Alternative Computer Architecture (ARA)&#8221; to Capgemini Deutschland GmbH. The topic of the preliminary study are novel computer models that go beyond today&#8217;s binary logic on silicon based semiconductor chips. The preliminary study forms the basis for further research work.  <\/strong><\/p>\n\n<p>On March 11, 2024, the Cyberagentur commissioned a preliminary study on alternative computer architectures.\nThe French company and its branch in Berlin won the competition, which was announced in November 2023<a href=\"\">(https:\/\/www.cyberagentur.de\/computertechnologie-durch-gehirn-inspirierte-hardware\/)<\/a>. <\/p>\n\n<p>The aim of the research contract is to identify new approaches to computer architectures worldwide that are based on models other than traditional binary logic and exceed the performance limits of conventional semiconductor chips.<\/p>\n\n<p>In such alternative computer architectures (ARA), for example, calculations are performed using light or DNA. The advantages could be more efficient computing and faster learning for AI applications as well as less dependence on strategic raw materials. <\/p>\n\n<p>The preliminary study will also analyse the security-relevant potential of the identified computer architectures. This involves both the possibilities of security-critical applications such as encryption methods and the risks of newly emerging security vulnerabilities and susceptibility to faults. <\/p>\n\n<p>The ARA preliminary study is scheduled to run for nine months. At the end of the project, all identified approaches will be summarised and presented interactively in a kind of wiki. All computer architectures are to be evaluated considering the current and future security-relevant requirements of the Bundeswehr and the security authorities.  <\/p>\n\n<p>Based on the findings of the project, a more extensive research competition is planned in order to study the various architectures in detail.<\/p>\n\n<p><strong>Further information:<\/strong> <a href=\"https:\/\/www.cyberagentur.de\/ara\">https:\/\/www.cyberagentur.de\/ara<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberagentur awards preliminary study to Berlin The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has awarded a contract for a preliminary study for the research project &#8220;Alternative Computer Architecture (ARA)&#8221; to Capgemini Deutschland GmbH. The topic of the preliminary study are novel computer models that go beyond today&#8217;s binary logic on silicon based semiconductor [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":2585,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54],"tags":[],"class_list":["post-4707","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-systems"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What alternative computer architectures are conceivable? - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What alternative computer architectures are conceivable? - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Cyberagentur awards preliminary study to Berlin The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has awarded a contract for a preliminary study for the research project &#8220;Alternative Computer Architecture (ARA)&#8221; to Capgemini Deutschland GmbH. The topic of the preliminary study are novel computer models that go beyond today&#8217;s binary logic on silicon based semiconductor [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-12T15:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-16T17:30:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"What alternative computer architectures are conceivable?\",\"datePublished\":\"2024-03-12T15:59:00+00:00\",\"dateModified\":\"2025-01-16T17:30:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/\"},\"wordCount\":298,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ARA-Vorstudie.png\",\"articleSection\":[\"Cybersecurity of Complex Systems\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/\",\"name\":\"What alternative computer architectures are conceivable? - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ARA-Vorstudie.png\",\"datePublished\":\"2024-03-12T15:59:00+00:00\",\"dateModified\":\"2025-01-16T17:30:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ARA-Vorstudie.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ARA-Vorstudie.png\",\"width\":1500,\"height\":1000,\"caption\":\"Cyberagentur vergibt Auftrag zu Vorstudien f\u00fcr Alternative Rechnerarchitekturen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/which-alternative-computer-architectures-are-conceivable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What alternative computer architectures are conceivable?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What alternative computer architectures are conceivable? - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/","og_locale":"en_GB","og_type":"article","og_title":"What alternative computer architectures are conceivable? - Cyberagentur","og_description":"Cyberagentur awards preliminary study to Berlin The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has awarded a contract for a preliminary study for the research project &#8220;Alternative Computer Architecture (ARA)&#8221; to Capgemini Deutschland GmbH. The topic of the preliminary study are novel computer models that go beyond today&#8217;s binary logic on silicon based semiconductor [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/","og_site_name":"Cyberagentur","article_published_time":"2024-03-12T15:59:00+00:00","article_modified_time":"2025-01-16T17:30:20+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie.png","type":"image\/png"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"What alternative computer architectures are conceivable?","datePublished":"2024-03-12T15:59:00+00:00","dateModified":"2025-01-16T17:30:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/"},"wordCount":298,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie.png","articleSection":["Cybersecurity of Complex Systems"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/","name":"What alternative computer architectures are conceivable? - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie.png","datePublished":"2024-03-12T15:59:00+00:00","dateModified":"2025-01-16T17:30:20+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/#primaryimage","url":"\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie.png","contentUrl":"\/wp-content\/uploads\/2024\/08\/ARA-Vorstudie.png","width":1500,"height":1000,"caption":"Cyberagentur vergibt Auftrag zu Vorstudien f\u00fcr Alternative Rechnerarchitekturen."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/which-alternative-computer-architectures-are-conceivable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"What alternative computer architectures are conceivable?"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=4707"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4707\/revisions"}],"predecessor-version":[{"id":4708,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4707\/revisions\/4708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2585"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=4707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=4707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=4707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}