the machine - a vision for the future of computing
TRANSCRIPT
The Machine– a vision for the future of computing
James Salter, Research ManagerHewlett Packard Labs, Bristol, United Kingdom
2
The problem we are facing today
3
107
106
105
104
103
102
101
100
1975 1980 1985 1990 1995 2000 2005 2010 2015
The end of cheap hardwareCompute is not keeping up
2006 2008 2010 2012 2014 2016 2018 2020 20220
5
10
15
20
25
30
35
40
45
50
0.3 0.8 1.2 1.84.4
7.9
44
20092013
2020
Data(Zettabytes)
Years
Data nearly doubles every 2 years (2013-2020)
Transistors(thousands)
Single-threadPerformance(SpecINT)
Frequency(MHz)
Typical Power(Watts)
Number of Cores
4
The Past 60 Years
1950s 1960s 1970s 1980s 1990s 2000s Today
It’s time to rethink how computers are built
5
The Machine
6
I/O
Copper
7
Copper
8
Copper
9
10
From processor-centric computing…
MemoryMemory
Mem
ory
Mem
oryM
emory
Memory
MemoryMemory
Mem
ory
Mem
ory
Mem
ory
Memory
CPU CPU
CPUC
PU
CPU
CPUCPU
CPU
CPU
CP
UCP
U
CPUCPU CPU
CPUC
PU
CPU
CPUCPU
CPUCPU
CP
UCP
U
CPU
Memory+
Fabric
…to Memory-Driven Computing
11
Making the memory hierarchy obsolete
Massive Memory
Pool
FasterMore cost per bit
Capacity
Flash Accelerator
CPUregisters
L2 cache
L3 cache
Main Memory
SSD
L1 cache
Hard Disk
Network Drive Array
Network Backup
Archive
Processor
ComputerUniversal Memory
Network
12
Photonics destroys distance
Photonics
racks can behave as a single server
160
13
Processor-centric computing
Open ArchitectureMemory
Memory
Mem
ory
Mem
oryM
emory
Memory
MemoryMemory
Mem
ory
Mem
ory
Mem
ory
Memory
CPU CPU
CPUC
PU
CPU
CPUCPU
CPU
CPU
CP
UCP
UCPU
GPU DSPx86
AS
IC
Phot
onic
Godson
Quantum
POWERSPARC
RIS
CV
ARM
FPGA
OpenArchitecture
Memory-Driven Computing
14
The Machine security framework
The first computer with security built-in from the ground up
Data always protected: in use, in flight and at rest
Secure boot and firmware
Runtime monitoring
Access control
Low energy encryption
ProtectGiving The Machine the ability to protect itself, even against completely unknown threats
Compromised components
Firmware and kernel tampering
Runtime malware monitoring
Monitoring for data leakage
DetectAlways safe, always recoverable, without sacrificing performance
Recovery at the firmware layer
OS, application, and data recovery
Systematic recovery at scale with minimal human intervention
Recover
15
Manageability
Manageability for The Machine is automatic and transparent
Shift from Imperative to Declarative management
Using the power of The Machine to manage The Machine
Integrated with security framework
Actionable management system
User requests an end state and the system calculates and executes the details – it just works
Leveraging “unlimited memory”
Performing analytics on its own system information
What kind of world becomes possible?
17
Machine Learning that can keep up with the now Training up-to-date deep neural networks in minutes, not weeks
Keeping up with every click, every meme“Tell me the latest news
on the severe weather.”
Contextual ads
Suggested topics
Relevant content
18
Graph analytics time machineMassive memory and fast fabrics to ingest all data
Fast graph databases and the ability to look at things
that change over time
“Are there any emerging new behaviors in my
network?”Critical node
Remote users
External users
19
What if we could pre-compute an almost infinite set of “what ifs”?Optimization over a large search space in real time becomes realistic
Effectively infinite memory can simulate
large scale probabilities, just like in game
algorithms
Solve complex problems before they happen
We are only just learning what is possible
21
Thank [email protected]