Executive Profile: Who is Professor Ahmed Banafa?

Cyber magazine looks at the life and career of Professor Ahmed Banafa who is about to launch his new book on quantum computing.

Professor Ahmed Banafa has extensive experience in research, operations and management, with a focus on IoT, Blockchain, Cybersecurity and AI.

He is a reviewer and a technical contributor for the publication of several technical books and he served as an instructor at well-known universities and colleges, including Stanford University, University of California, Berkeley; California State University-East Bay; San Jose State University; and University of Massachusetts.

He is the recipient of several awards, including Distinguished Tenured Staff Award, Instructor of the year for four years in a row, and Certificate of Honor from the City and County of San Francisco. He was named as No.1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018 and his research featured on many reputable sites and in magazines including Forbes, IEEE and MIT Technology Review.

Banafa studied Electrical Engineering at Lehigh University, Cybersecurity at Harvard University and Digital Transformation at Massachusetts Institute of Technology (MIT). 

His newest book, "Quantum Computing and other Transformative Technologies," explores the exciting field of Quantum Computing as a transformative technology and its applications in communications, cryptography, teleportation, Internet of Things (IoT), Artificial Intelligence, and Blockchain, in addition to the revolutionary concept of Quantum Internet.

Professor Banafa said: "With quantum computing, we can solve a problem that takes 10,000 years with supercomputers in 200 seconds. While it is still in its development stage, tech giants are putting in significant resources to build powerful quantum computers.

"Quantum computing technology is very promising and while continuous research and development are needed, there is potential for widespread practical applications for both consumers and businesses such as quantum internet and even quantum teleportation."

The book will be released in January 2022.

Big Data 

Speaking on big data, another topic he is well versed in, Professor Banafa said: "One of the challenges facing businesses in post-COVID-19 world is the fact that consumer behaviour won’t go back to pre-pandemic norms. Consumers will purchase more goods and services online, and increasing numbers of people will work remotely just to mention few major changes. As companies begin to navigate the post-COVID-19 world as economies slowly begin to reopen, the use of data analytics tools will be extremely valuable in helping them adapt to these new trends. Data analytics tools will be particularly useful for detecting new purchasing patterns and delivering a greater personalized experience to customers, in addition to better understanding of consumers new behaviour.

"However, many companies are still dealing with obstacles to successful big data projects. Across industries, the adoption of big data initiatives is way up. Spending has increased, and the vast majority of companies using big data expect return on investment. Nevertheless, companies still cite a lack of visibility into processes and information as a primary big data pain point. Modelling customer segments accurately can be impossible for businesses who don’t understand why, how and when their customers decide to make purchases for example."

 

Share

Featured Articles

Founder Shield MD on Navigating Multi-Cloud Complexities

Founder Shield Managing Director Jonathan Selby talks strategies to navigating the complexities of multi-cloud set ups

Qodea CISO Explains How Cyber Threats Could Outrun Cost

Qodea CISO Business Manager Ed Russell explains how growth in sophistication and volume of attacks means current investment in defences falls short

Nokia and NL-ix Deploy Europe’s Largest IXP-Based Anti-DDoS

This collaboration between Nokia and NL-ix is unprecedented both being Largest IXP-Based Anti-DDoS, but the first anti-DDoS solution deployed by an IXP

Bridging the Gap: Examining the UK-US Data Bridge

Data Breaches

Hiddenlayer CSO Tells Why It Made an AI Security Council

Technology & AI

Cooperation Key Theme at Microsoft Endpoint Security Summit

Cyber Security