{"id":4714,"date":"2024-06-12T13:12:00","date_gmt":"2024-06-12T11:12:00","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/"},"modified":"2025-05-22T14:17:51","modified_gmt":"2025-05-22T12:17:51","slug":"new-computing-technologies-innovative-but-safe","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/","title":{"rendered":"New computing technologies: innovative &#8211; but secure!"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>Cyberagentur seminar series on alternative computer architectures<\/strong><\/h2>\n<div class='ce-spacer'><\/div>  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n    <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px-1024x683.png\" class=\"attachment-large size-large\" alt=\"Seminarreihe Alternative Rechnerarchitekturen der Cyberagentur.\" srcset=\"\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px-1024x683.png 1024w, \/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px-330x220.png 330w, \/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px-768x512.png 768w, \/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px-512x341.png 512w, \/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Seminarreihe Alternative Rechnerarchitekturen der Cyberagentur.<\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>The Cyberagentur invites you to a series of seminars on alternative computer architectures. The events, which will take place in Halle (Saale) in July, in Berlin in August and in Bonn in October, will provide an overview of future technologies beyond the binary logic of today&#8217;s digital computers. The aim is to promote understanding of these technologies, highlight possible applications and establish strong interaction between the research community and potential users.  <\/strong><\/p>\n\n<p>As part of the \u201cAlternative Computer Architectures\u201d (ARA) study, the Cyberagentur has initiated a series of seminars highlighting innovative approaches in computing technology. The first seminars will take place on July 2 and 3, 2024 in Halle (Saale), on August 27 and 28, 2024 in the Berlin area and on October 15 and 16, 2024 in the Bonn area. Interested parties can <a href=\"https:\/\/www.cyberagentur.de\/ara-en\/\">register<\/a> for the seminars using the form provided.        <\/p>\n\n<p>The seminar series accompanies the comprehensive preliminary study, which classifies and compares various alternative computer architectures. This preliminary study is intended to show how the different architectures can help to deal with current and future challenges of internal and external security and what effects &#8211; positive and negative &#8211; they will have on cyber security. The seminars should help to deepen the understanding of the potential of alternative computer architectures, identify practical application examples and build an interdisciplinary community between researchers, users and industry.  <\/p>\n\n<p>The seminar program is published on the <a href=\"https:\/\/www.cyberagentur.de\/ara\/\">landing page<\/a> of the project.<\/p>\n\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>ARA project &#8211; two-stage research project<\/strong><\/h2>\n\n<p>With the increasing importance and spread of computer technology, conventional technologies are facing physical and logical limits. New architectures could solve specific types of problems more efficiently and be more resistant to certain attack vectors. In addition, dependence on strategic raw materials could be reduced and Germany&#8217;s strategic independence promoted.  <\/p>\n\n<p>The ARA research project aims to identify alternative computer architectures as future key technological areas and to explore their potential. Alternative computer architectures include approaches that deviate from conventional binary logic and semiconductor electronics. These include logical-mathematical computing models such as analog, ternary, neuromorphic and associative computing as well as physical implementations from physics (e.g. optical computing), chemistry (e.g. molecular computing) and biology (e.g. slime molds). Quantum computers are not covered by this project, as they are investigated separately.   <\/p>\n\n<p>This preliminary study is the first phase of the project and includes the creation of a framework for collecting and comparing the various architectures and comparing them with security-relevant requirements and use cases.<\/p>\n\n<p>Based on the results of the preliminary study, a research competition is planned in the main phase of the research project in order to intensively investigate individual, particularly relevant or promising architectures.<\/p>\n\n<p>The Cyberagentur invites all interested parties to participate in the seminars in order to jointly shape the future of computing technology and strengthen Germany&#8217;s strategic independence.<\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\"><strong>Further information and registration via the landing page:<\/strong> <\/h3>\n\n<p><a href=\"https:\/\/www.cyberagentur.de\/ara\/\">https:\/\/www.cyberagentur.de\/ara\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberagentur seminar series on alternative computer architectures The Cyberagentur invites you to a series of seminars on alternative computer architectures. The events, which will take place in Halle (Saale) in July, in Berlin in August and in Bonn in October, will provide an overview of future technologies beyond the binary logic of today&#8217;s digital computers. [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":2380,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54],"tags":[],"class_list":["post-4714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-systems"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New computing technologies: innovative - but secure! - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New computing technologies: innovative - but secure! - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Cyberagentur seminar series on alternative computer architectures The Cyberagentur invites you to a series of seminars on alternative computer architectures. The events, which will take place in Halle (Saale) in July, in Berlin in August and in Bonn in October, will provide an overview of future technologies beyond the binary logic of today&#8217;s digital computers. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T11:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T12:17:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"New computing technologies: innovative &#8211; but secure!\",\"datePublished\":\"2024-06-12T11:12:00+00:00\",\"dateModified\":\"2025-05-22T12:17:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/\"},\"wordCount\":487,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/MOTIV-Projekt-ARA-5774-x-1858px.png\",\"articleSection\":[\"Cybersecurity of Complex Systems\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/\",\"name\":\"New computing technologies: innovative - but secure! - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/MOTIV-Projekt-ARA-5774-x-1858px.png\",\"datePublished\":\"2024-06-12T11:12:00+00:00\",\"dateModified\":\"2025-05-22T12:17:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/MOTIV-Projekt-ARA-5774-x-1858px.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/MOTIV-Projekt-ARA-5774-x-1858px.png\",\"width\":1500,\"height\":1000,\"caption\":\"Seminarreihe Alternative Rechnerarchitekturen der Cyberagentur.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/new-computing-technologies-innovative-but-safe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New computing technologies: innovative &#8211; but secure!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New computing technologies: innovative - but secure! - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/","og_locale":"en_GB","og_type":"article","og_title":"New computing technologies: innovative - but secure! - Cyberagentur","og_description":"Cyberagentur seminar series on alternative computer architectures The Cyberagentur invites you to a series of seminars on alternative computer architectures. The events, which will take place in Halle (Saale) in July, in Berlin in August and in Bonn in October, will provide an overview of future technologies beyond the binary logic of today&#8217;s digital computers. [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/","og_site_name":"Cyberagentur","article_published_time":"2024-06-12T11:12:00+00:00","article_modified_time":"2025-05-22T12:17:51+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px.png","type":"image\/png"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"New computing technologies: innovative &#8211; but secure!","datePublished":"2024-06-12T11:12:00+00:00","dateModified":"2025-05-22T12:17:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/"},"wordCount":487,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px.png","articleSection":["Cybersecurity of Complex Systems"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/","name":"New computing technologies: innovative - but secure! - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px.png","datePublished":"2024-06-12T11:12:00+00:00","dateModified":"2025-05-22T12:17:51+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/#primaryimage","url":"\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px.png","contentUrl":"\/wp-content\/uploads\/2024\/07\/MOTIV-Projekt-ARA-5774-x-1858px.png","width":1500,"height":1000,"caption":"Seminarreihe Alternative Rechnerarchitekturen der Cyberagentur."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/new-computing-technologies-innovative-but-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"New computing technologies: innovative &#8211; but secure!"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=4714"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4714\/revisions"}],"predecessor-version":[{"id":5138,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/4714\/revisions\/5138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2380"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=4714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=4714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=4714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}