SlideShare a Scribd company logo
CRNCH Rogues Gallery: A Community Core
for Novel Computing Platforms
E. Jason Riedy, Jeffrey Young
School of Computational Science and Engineering
Georgia Institute of Technology
3 November 2017
Outline
Why Do We Need Rogues?
Current Rogues
Emu Chick
3D Stacked Memories and FPGAs
Neuromorphic Hardware
Infrastructure and Invitation
(Some) Enabled Research
Streaming Graph Analysis
Sparse Tensors
Sparse Matrix Operations
Why do we need rogues?
Rogue
Someone who goes their own way, who breaks away
from the crowd.
• Current architectures are hitting limits on
manufacturing, heat dissipation, memory latency...
• What happens when novel prototypes hit reality?
• Designers need feedback, a software ecosystem, and
trained students.
CRNCH Rogues Gallery — 3 Nov 2017 3/16
Apps: Massive+-scale data analysis
Cyber-security Identify anomalies, malicious actors
Health care Find outbreaks, population epidemiology, similar
patient association
Social networks Advertising, searching, grouping
Intelligence Decisions at scale, regulating markets, smart &
sustainable cities
Systems biology Understanding interactions, drug design
Power grid / Smart cities Disruptions, conservation, prediction
Irregular data access. Changing data.
CRNCH Rogues Gallery — 3 Nov 2017 4/16
Introducing the CRNCH Rogues Gallery
CRNCH Rogues Gallery
A physical & virtual space for hosting novel computing
architectures, systems, and accelerators.
Host / manage remote access for novel architectures to
• kick-start software ecosystems (Kokkos),
• leverage real applications to train students, and
• provide rapid feedback to architects.
Amortize effort and cost of trying novel architectures.
Break the “but it’s too much work” barrier.
http://crnch.gatech.edu/rogues-gallery
CRNCH Rogues Gallery — 3 Nov 2017 5/16
Why here and now?
• Past (and present): Experience with hosting,
software, training for novel architectures:
• STI Center for the Cell Broadband Engine Processor;
• NVIDIA Center for Excellence;
• multiple Intel Parallel Computing Centers; and
• multiple NSF & DARPA projects.
• Developed expertise, now sharing efforts.
• Current local- to national-scale applications:
• Machine learning: ML@GT
• Health care analytics, clinical focus: CHAI
• Data-driven science & discovery: NSF South Big Data Hub,
FLAMEL, IDEaS, ATL Data Science for Social Good
• Combining novel architectures & applications.
• And enabling new combinations for others!
CRNCH Rogues Gallery — 3 Nov 2017 6/16
Current Rogues
Current Rogues
Emu Chick
3D Stacked Memories and FPGAs
Neuromorphic Hardware
Infrastructure and Invitation
CRNCH Rogues Gallery — 3 Nov 2017 7/16
Emu Chick
• “Migratory Memory Side Processing” to
exploit weak locality.
• Data for graph edge attributes,
documents / medical records, etc. reside
nearby even if accessed irregularly.
• Moving threads to data on reads means
all accesses are local, common case
needs to tolerate less latency.
Gossamer CPU
Memory
Gossamer CPU
Memory
Migrate on read
CRNCH Rogues Gallery — 3 Nov 2017 8/16
3D Stacked Memory and FPGAs
• Rogues Gallery includes traditional FPGA platforms
(Arria 10, Ultrascale+) and stacked memory variants
• Enable “near-memory” and memory-centric
processing.
• FPGA platforms enable prototypes of non-traditional
accelerators like Automata, sparse data engines, etc.
• Current work is supported in part by Micron
hardware donation.
CRNCH Rogues Gallery — 3 Nov 2017 9/16
Neuromorphic systems
• Field-Programmable Analog Array (FPAA) System-On
Chip, designed in the lab of Dr. Jennifer Hasler.
• Uses analog technology supported by digital
components to achieve unprecedented power and
size reductions.
• Near-term industry products include TrueNorth and
Intel Loihi
CRNCH Rogues Gallery — 3 Nov 2017 10/16
Flexible Infrastructure
Front end, rg-login
Emu SDK
FPGA dev
Emu Chick
FPGA+HMC
...
Your HW?
• Always WIP. Will adapt to individual needs.
• Front-end node for general access.
• Slurm for overall queuing and access control.
• Controls access-limited development tools.
• NDAs: Groups, file permissions
• Limited licenses: VMs and slurm resources
• Working towards sensitive data, e.g. health care.
• Swap VLANs for resources? (SDN)
CRNCH Rogues Gallery — 3 Nov 2017 11/16
(Some) Enabled Research
(Some) Enabled Research
Streaming Graph Analysis
Sparse Tensors
Sparse Matrix Operations
Only a sampling, more projects are ongoing & interested!
CRNCH Rogues Gallery — 3 Nov 2017 12/16
Streaming graph analysis
Streaming graph frameworks:
• STINGER: 3M upd/s in 1.1B vertex,
17B edge graph on 4×Haswell
• Hornet: 120M upd/s in 50M vertex
graph on P100
DynoGraph: wrap above for evaluation
on other architectures!
• Emu Chick simulator
• Emu Chick hardware!
Adding dynamic community detection,
incremental PageRank, concurrent
analysis, and more.
Support: IARPA, NSF, DARPA, Intel, IBM, NVIDIA, Oracle, ORNLCRNCH Rogues Gallery — 3 Nov 2017 13/16
Sparse tensors
• ParTI: Supports fast, essential sparse tensor
operations on CPU and GPU.
• Rogues Gallery supports extensions to Emu and
FPGA+3D memories
• Incorporates open data sets like FROSTT
Support: NSF, DoE
CRNCH Rogues Gallery — 3 Nov 2017 14/16
Sparse matrix operations
• Sparse primitives provide a key point for optimizing
data movement
• We are looking to optimize sparse primitives with 3D
memories for HPC libraries like SuperLU
• Scatter and gather are key but other primitives are
also useful in graph analytics
Support: NSF
CRNCH Rogues Gallery — 3 Nov 2017 15/16
Others are joining!
Other local researchers are looking to use the Rogues:
• Multilingual topic modeling with NMF
• Fraud detection in health insurance
• Anomalies for computer network security
We welcome external users and their applications!
CRNCH Rogues Gallery connects researchers with novel
architectures and architects with upcoming applications.
Let us host / manage your neat stuff!
http://crnch.gatech.edu/rogues-gallery
CRNCH Rogues Gallery — 3 Nov 2017 16/16
External Image Credits
• Oscar Wilde: public domain, obtained from Wikipedia
• Edna St. Vincent Millay: public domain, obtained from
Wikipedia
• Dread Pirate Roberts: copyright 20th
Century Fox, used for
identification
• Mary Jackson, Katherine Goble Johnson, Dorothy Vaughan
(Hidden Figures): copyright 20th
Century Fox, used for
identification
• Malcolm Reynolds: copyright Universal Pictures, used for
identification
• Rogue One: copyright Walt Disney Studios Motion Pictures,
used for identification
• The Story of Karrawingi, the emu (cover): copyright estate of
Leslie Rees, used for identification
CRNCH Rogues Gallery — 3 Nov 2017

More Related Content

Similar to CRNCH Rogues Gallery: A Community Core for Novel Computing Platforms

PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...
PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...
PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...
Jason Riedy
 
CRNCH 2018 Summit: Rogues Gallery Update
CRNCH 2018 Summit: Rogues Gallery UpdateCRNCH 2018 Summit: Rogues Gallery Update
CRNCH 2018 Summit: Rogues Gallery Update
Jason Riedy
 
Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"
Discover Pinterest
 
Designing High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPCDesigning High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPC
Object Automation
 
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data ScienceDesigning High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
Object Automation
 
FAIRSpectra - Towards a common data file format for SIMS images
FAIRSpectra - Towards a common data file format for SIMS imagesFAIRSpectra - Towards a common data file format for SIMS images
FAIRSpectra - Towards a common data file format for SIMS images
Alex Henderson
 
XDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem
XDF 2019 Xilinx Accelerated Database and Data Analytics EcosystemXDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem
XDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem
Dan Eaton
 
talks-afanasyev2013ndnsim-tutorial.pptx
talks-afanasyev2013ndnsim-tutorial.pptxtalks-afanasyev2013ndnsim-tutorial.pptx
talks-afanasyev2013ndnsim-tutorial.pptx
hazwan30
 
Chug dl presentation
Chug dl presentationChug dl presentation
Chug dl presentation
Chicago Hadoop Users Group
 
Novel Architectures for Applications in Data Science and Beyond
Novel Architectures for Applications in Data Science and BeyondNovel Architectures for Applications in Data Science and Beyond
Novel Architectures for Applications in Data Science and Beyond
Jason Riedy
 
Bergman Enabling Computation for neuro ML external
Bergman Enabling Computation for neuro ML externalBergman Enabling Computation for neuro ML external
Bergman Enabling Computation for neuro ML externalazlefty
 
2. Cnnecst-Why the use of FPGA?
2. Cnnecst-Why the use of FPGA? 2. Cnnecst-Why the use of FPGA?
2. Cnnecst-Why the use of FPGA?
CNNECST - Convolutional Neural Networks
 
Data-intensive bioinformatics on HPC and Cloud
Data-intensive bioinformatics on HPC and CloudData-intensive bioinformatics on HPC and Cloud
Data-intensive bioinformatics on HPC and Cloud
Ola Spjuth
 
ER 2016 Tutorial
ER 2016 TutorialER 2016 Tutorial
ER 2016 Tutorial
Rim Moussa
 
Novi sad ai event 1-2018
Novi sad ai event 1-2018Novi sad ai event 1-2018
Novi sad ai event 1-2018
Jovan Stojanovic
 
(Big) Data (Science) Skills
(Big) Data (Science) Skills(Big) Data (Science) Skills
(Big) Data (Science) Skills
Oscar Corcho
 
Future of hpc
Future of hpcFuture of hpc
Future of hpc
Putchong Uthayopas
 

Similar to CRNCH Rogues Gallery: A Community Core for Novel Computing Platforms (20)

PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...
PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...
PEARC19: Wrangling Rogues: A Case Study on Managing Experimental Post-Moore A...
 
CRNCH 2018 Summit: Rogues Gallery Update
CRNCH 2018 Summit: Rogues Gallery UpdateCRNCH 2018 Summit: Rogues Gallery Update
CRNCH 2018 Summit: Rogues Gallery Update
 
Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"
 
Designing High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPCDesigning High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPC
 
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data ScienceDesigning High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
 
FAIRSpectra - Towards a common data file format for SIMS images
FAIRSpectra - Towards a common data file format for SIMS imagesFAIRSpectra - Towards a common data file format for SIMS images
FAIRSpectra - Towards a common data file format for SIMS images
 
XDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem
XDF 2019 Xilinx Accelerated Database and Data Analytics EcosystemXDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem
XDF 2019 Xilinx Accelerated Database and Data Analytics Ecosystem
 
talks-afanasyev2013ndnsim-tutorial.pptx
talks-afanasyev2013ndnsim-tutorial.pptxtalks-afanasyev2013ndnsim-tutorial.pptx
talks-afanasyev2013ndnsim-tutorial.pptx
 
Chug dl presentation
Chug dl presentationChug dl presentation
Chug dl presentation
 
Novel Architectures for Applications in Data Science and Beyond
Novel Architectures for Applications in Data Science and BeyondNovel Architectures for Applications in Data Science and Beyond
Novel Architectures for Applications in Data Science and Beyond
 
Bergman Enabling Computation for neuro ML external
Bergman Enabling Computation for neuro ML externalBergman Enabling Computation for neuro ML external
Bergman Enabling Computation for neuro ML external
 
grid computing
grid computinggrid computing
grid computing
 
2. Cnnecst-Why the use of FPGA?
2. Cnnecst-Why the use of FPGA? 2. Cnnecst-Why the use of FPGA?
2. Cnnecst-Why the use of FPGA?
 
Bertenthal
BertenthalBertenthal
Bertenthal
 
Data-intensive bioinformatics on HPC and Cloud
Data-intensive bioinformatics on HPC and CloudData-intensive bioinformatics on HPC and Cloud
Data-intensive bioinformatics on HPC and Cloud
 
Spark
SparkSpark
Spark
 
ER 2016 Tutorial
ER 2016 TutorialER 2016 Tutorial
ER 2016 Tutorial
 
Novi sad ai event 1-2018
Novi sad ai event 1-2018Novi sad ai event 1-2018
Novi sad ai event 1-2018
 
(Big) Data (Science) Skills
(Big) Data (Science) Skills(Big) Data (Science) Skills
(Big) Data (Science) Skills
 
Future of hpc
Future of hpcFuture of hpc
Future of hpc
 

More from Jason Riedy

Lucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoFLucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoF
Jason Riedy
 
LAGraph 2021-10-13
LAGraph 2021-10-13LAGraph 2021-10-13
LAGraph 2021-10-13
Jason Riedy
 
Lucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoFLucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoF
Jason Riedy
 
Graph analysis and novel architectures
Graph analysis and novel architecturesGraph analysis and novel architectures
Graph analysis and novel architectures
Jason Riedy
 
GraphBLAS and Emus
GraphBLAS and EmusGraphBLAS and Emus
GraphBLAS and Emus
Jason Riedy
 
Reproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to ArchitectureReproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to Architecture
Jason Riedy
 
ICIAM 2019: Reproducible Linear Algebra from Application to Architecture
ICIAM 2019: Reproducible Linear Algebra from Application to ArchitectureICIAM 2019: Reproducible Linear Algebra from Application to Architecture
ICIAM 2019: Reproducible Linear Algebra from Application to Architecture
Jason Riedy
 
ICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph Analysis
ICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph AnalysisICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph Analysis
ICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph Analysis
Jason Riedy
 
Characterization of Emu Chick with Microbenchmarks
Characterization of Emu Chick with MicrobenchmarksCharacterization of Emu Chick with Microbenchmarks
Characterization of Emu Chick with Microbenchmarks
Jason Riedy
 
Augmented Arithmetic Operations Proposed for IEEE-754 2018
Augmented Arithmetic Operations Proposed for IEEE-754 2018Augmented Arithmetic Operations Proposed for IEEE-754 2018
Augmented Arithmetic Operations Proposed for IEEE-754 2018
Jason Riedy
 
Graph Analysis: New Algorithm Models, New Architectures
Graph Analysis: New Algorithm Models, New ArchitecturesGraph Analysis: New Algorithm Models, New Architectures
Graph Analysis: New Algorithm Models, New Architectures
Jason Riedy
 
A New Algorithm Model for Massive-Scale Streaming Graph Analysis
A New Algorithm Model for Massive-Scale Streaming Graph AnalysisA New Algorithm Model for Massive-Scale Streaming Graph Analysis
A New Algorithm Model for Massive-Scale Streaming Graph Analysis
Jason Riedy
 
High-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming Graphs High-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming Graphs
Jason Riedy
 
High-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming GraphsHigh-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming Graphs
Jason Riedy
 
Updating PageRank for Streaming Graphs
Updating PageRank for Streaming GraphsUpdating PageRank for Streaming Graphs
Updating PageRank for Streaming Graphs
Jason Riedy
 
Scalable and Efficient Algorithms for Analysis of Massive, Streaming Graphs
Scalable and Efficient Algorithms for Analysis of Massive, Streaming GraphsScalable and Efficient Algorithms for Analysis of Massive, Streaming Graphs
Scalable and Efficient Algorithms for Analysis of Massive, Streaming Graphs
Jason Riedy
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
Jason Riedy
 
Network Challenge: Error and Sensitivity Analysis
Network Challenge: Error and Sensitivity AnalysisNetwork Challenge: Error and Sensitivity Analysis
Network Challenge: Error and Sensitivity Analysis
Jason Riedy
 
Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014
Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014
Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014
Jason Riedy
 
STING: Spatio-Temporal Interaction Networks and Graphs for Intel Platforms
STING: Spatio-Temporal Interaction Networks and Graphs for Intel PlatformsSTING: Spatio-Temporal Interaction Networks and Graphs for Intel Platforms
STING: Spatio-Temporal Interaction Networks and Graphs for Intel Platforms
Jason Riedy
 

More from Jason Riedy (20)

Lucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoFLucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoF
 
LAGraph 2021-10-13
LAGraph 2021-10-13LAGraph 2021-10-13
LAGraph 2021-10-13
 
Lucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoFLucata at the HPEC GraphBLAS BoF
Lucata at the HPEC GraphBLAS BoF
 
Graph analysis and novel architectures
Graph analysis and novel architecturesGraph analysis and novel architectures
Graph analysis and novel architectures
 
GraphBLAS and Emus
GraphBLAS and EmusGraphBLAS and Emus
GraphBLAS and Emus
 
Reproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to ArchitectureReproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to Architecture
 
ICIAM 2019: Reproducible Linear Algebra from Application to Architecture
ICIAM 2019: Reproducible Linear Algebra from Application to ArchitectureICIAM 2019: Reproducible Linear Algebra from Application to Architecture
ICIAM 2019: Reproducible Linear Algebra from Application to Architecture
 
ICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph Analysis
ICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph AnalysisICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph Analysis
ICIAM 2019: A New Algorithm Model for Massive-Scale Streaming Graph Analysis
 
Characterization of Emu Chick with Microbenchmarks
Characterization of Emu Chick with MicrobenchmarksCharacterization of Emu Chick with Microbenchmarks
Characterization of Emu Chick with Microbenchmarks
 
Augmented Arithmetic Operations Proposed for IEEE-754 2018
Augmented Arithmetic Operations Proposed for IEEE-754 2018Augmented Arithmetic Operations Proposed for IEEE-754 2018
Augmented Arithmetic Operations Proposed for IEEE-754 2018
 
Graph Analysis: New Algorithm Models, New Architectures
Graph Analysis: New Algorithm Models, New ArchitecturesGraph Analysis: New Algorithm Models, New Architectures
Graph Analysis: New Algorithm Models, New Architectures
 
A New Algorithm Model for Massive-Scale Streaming Graph Analysis
A New Algorithm Model for Massive-Scale Streaming Graph AnalysisA New Algorithm Model for Massive-Scale Streaming Graph Analysis
A New Algorithm Model for Massive-Scale Streaming Graph Analysis
 
High-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming Graphs High-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming Graphs
 
High-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming GraphsHigh-Performance Analysis of Streaming Graphs
High-Performance Analysis of Streaming Graphs
 
Updating PageRank for Streaming Graphs
Updating PageRank for Streaming GraphsUpdating PageRank for Streaming Graphs
Updating PageRank for Streaming Graphs
 
Scalable and Efficient Algorithms for Analysis of Massive, Streaming Graphs
Scalable and Efficient Algorithms for Analysis of Massive, Streaming GraphsScalable and Efficient Algorithms for Analysis of Massive, Streaming Graphs
Scalable and Efficient Algorithms for Analysis of Massive, Streaming Graphs
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
 
Network Challenge: Error and Sensitivity Analysis
Network Challenge: Error and Sensitivity AnalysisNetwork Challenge: Error and Sensitivity Analysis
Network Challenge: Error and Sensitivity Analysis
 
Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014
Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014
Graph Analysis Trends and Opportunities -- CMG Performance and Capacity 2014
 
STING: Spatio-Temporal Interaction Networks and Graphs for Intel Platforms
STING: Spatio-Temporal Interaction Networks and Graphs for Intel PlatformsSTING: Spatio-Temporal Interaction Networks and Graphs for Intel Platforms
STING: Spatio-Temporal Interaction Networks and Graphs for Intel Platforms
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

CRNCH Rogues Gallery: A Community Core for Novel Computing Platforms

  • 1. CRNCH Rogues Gallery: A Community Core for Novel Computing Platforms E. Jason Riedy, Jeffrey Young School of Computational Science and Engineering Georgia Institute of Technology 3 November 2017
  • 2. Outline Why Do We Need Rogues? Current Rogues Emu Chick 3D Stacked Memories and FPGAs Neuromorphic Hardware Infrastructure and Invitation (Some) Enabled Research Streaming Graph Analysis Sparse Tensors Sparse Matrix Operations
  • 3. Why do we need rogues? Rogue Someone who goes their own way, who breaks away from the crowd. • Current architectures are hitting limits on manufacturing, heat dissipation, memory latency... • What happens when novel prototypes hit reality? • Designers need feedback, a software ecosystem, and trained students. CRNCH Rogues Gallery — 3 Nov 2017 3/16
  • 4. Apps: Massive+-scale data analysis Cyber-security Identify anomalies, malicious actors Health care Find outbreaks, population epidemiology, similar patient association Social networks Advertising, searching, grouping Intelligence Decisions at scale, regulating markets, smart & sustainable cities Systems biology Understanding interactions, drug design Power grid / Smart cities Disruptions, conservation, prediction Irregular data access. Changing data. CRNCH Rogues Gallery — 3 Nov 2017 4/16
  • 5. Introducing the CRNCH Rogues Gallery CRNCH Rogues Gallery A physical & virtual space for hosting novel computing architectures, systems, and accelerators. Host / manage remote access for novel architectures to • kick-start software ecosystems (Kokkos), • leverage real applications to train students, and • provide rapid feedback to architects. Amortize effort and cost of trying novel architectures. Break the “but it’s too much work” barrier. http://crnch.gatech.edu/rogues-gallery CRNCH Rogues Gallery — 3 Nov 2017 5/16
  • 6. Why here and now? • Past (and present): Experience with hosting, software, training for novel architectures: • STI Center for the Cell Broadband Engine Processor; • NVIDIA Center for Excellence; • multiple Intel Parallel Computing Centers; and • multiple NSF & DARPA projects. • Developed expertise, now sharing efforts. • Current local- to national-scale applications: • Machine learning: ML@GT • Health care analytics, clinical focus: CHAI • Data-driven science & discovery: NSF South Big Data Hub, FLAMEL, IDEaS, ATL Data Science for Social Good • Combining novel architectures & applications. • And enabling new combinations for others! CRNCH Rogues Gallery — 3 Nov 2017 6/16
  • 7. Current Rogues Current Rogues Emu Chick 3D Stacked Memories and FPGAs Neuromorphic Hardware Infrastructure and Invitation CRNCH Rogues Gallery — 3 Nov 2017 7/16
  • 8. Emu Chick • “Migratory Memory Side Processing” to exploit weak locality. • Data for graph edge attributes, documents / medical records, etc. reside nearby even if accessed irregularly. • Moving threads to data on reads means all accesses are local, common case needs to tolerate less latency. Gossamer CPU Memory Gossamer CPU Memory Migrate on read CRNCH Rogues Gallery — 3 Nov 2017 8/16
  • 9. 3D Stacked Memory and FPGAs • Rogues Gallery includes traditional FPGA platforms (Arria 10, Ultrascale+) and stacked memory variants • Enable “near-memory” and memory-centric processing. • FPGA platforms enable prototypes of non-traditional accelerators like Automata, sparse data engines, etc. • Current work is supported in part by Micron hardware donation. CRNCH Rogues Gallery — 3 Nov 2017 9/16
  • 10. Neuromorphic systems • Field-Programmable Analog Array (FPAA) System-On Chip, designed in the lab of Dr. Jennifer Hasler. • Uses analog technology supported by digital components to achieve unprecedented power and size reductions. • Near-term industry products include TrueNorth and Intel Loihi CRNCH Rogues Gallery — 3 Nov 2017 10/16
  • 11. Flexible Infrastructure Front end, rg-login Emu SDK FPGA dev Emu Chick FPGA+HMC ... Your HW? • Always WIP. Will adapt to individual needs. • Front-end node for general access. • Slurm for overall queuing and access control. • Controls access-limited development tools. • NDAs: Groups, file permissions • Limited licenses: VMs and slurm resources • Working towards sensitive data, e.g. health care. • Swap VLANs for resources? (SDN) CRNCH Rogues Gallery — 3 Nov 2017 11/16
  • 12. (Some) Enabled Research (Some) Enabled Research Streaming Graph Analysis Sparse Tensors Sparse Matrix Operations Only a sampling, more projects are ongoing & interested! CRNCH Rogues Gallery — 3 Nov 2017 12/16
  • 13. Streaming graph analysis Streaming graph frameworks: • STINGER: 3M upd/s in 1.1B vertex, 17B edge graph on 4×Haswell • Hornet: 120M upd/s in 50M vertex graph on P100 DynoGraph: wrap above for evaluation on other architectures! • Emu Chick simulator • Emu Chick hardware! Adding dynamic community detection, incremental PageRank, concurrent analysis, and more. Support: IARPA, NSF, DARPA, Intel, IBM, NVIDIA, Oracle, ORNLCRNCH Rogues Gallery — 3 Nov 2017 13/16
  • 14. Sparse tensors • ParTI: Supports fast, essential sparse tensor operations on CPU and GPU. • Rogues Gallery supports extensions to Emu and FPGA+3D memories • Incorporates open data sets like FROSTT Support: NSF, DoE CRNCH Rogues Gallery — 3 Nov 2017 14/16
  • 15. Sparse matrix operations • Sparse primitives provide a key point for optimizing data movement • We are looking to optimize sparse primitives with 3D memories for HPC libraries like SuperLU • Scatter and gather are key but other primitives are also useful in graph analytics Support: NSF CRNCH Rogues Gallery — 3 Nov 2017 15/16
  • 16. Others are joining! Other local researchers are looking to use the Rogues: • Multilingual topic modeling with NMF • Fraud detection in health insurance • Anomalies for computer network security We welcome external users and their applications! CRNCH Rogues Gallery connects researchers with novel architectures and architects with upcoming applications. Let us host / manage your neat stuff! http://crnch.gatech.edu/rogues-gallery CRNCH Rogues Gallery — 3 Nov 2017 16/16
  • 17. External Image Credits • Oscar Wilde: public domain, obtained from Wikipedia • Edna St. Vincent Millay: public domain, obtained from Wikipedia • Dread Pirate Roberts: copyright 20th Century Fox, used for identification • Mary Jackson, Katherine Goble Johnson, Dorothy Vaughan (Hidden Figures): copyright 20th Century Fox, used for identification • Malcolm Reynolds: copyright Universal Pictures, used for identification • Rogue One: copyright Walt Disney Studios Motion Pictures, used for identification • The Story of Karrawingi, the emu (cover): copyright estate of Leslie Rees, used for identification CRNCH Rogues Gallery — 3 Nov 2017