SlideShare a Scribd company logo
elixir for the next 10 years0 years
boyd multerer
the basic exercise
know what problems you are trying to solve

know what trends and disruptions are happening around you

build something relevant when it ships, not when you started
problems to solve
servers
performance per cost

security

data processing

machine learning

communications

robustness
devices (iot)
performance per cost

security

data processing

machine learning

communications

robustness
example: game consoles
perf per cost //



security //


scalability //
robustness //
this is why you don’t just buy a PC……..……….



cheating & piracy - no physical security

hard, even though you’d think it would be necessary



keeping all games & consoles up to date is required
trends and observations
power drives cost
servers //



devices // 



power consumed means heat dissipated

power and heat cost real money

power consumed impacts battery life

sensors use lots of power

radios use lots of power
hw chosen to fit power and problem envelopes
security
servers //



devices // 



assume your servers are hacked

assume your databases are hacked

tremendously tempting targets

both devices and data

no physical security
this is an arms race and will not go away
it’s not paranoia if they are out to get you
FPGAs (you’ll be friends soon)
think extremely large instructions

very low power for perf

not in addressable space

physically unclonable functions (PUFs)

not as expensive as you think.
Xilinx
data processing
servers //



devices // 



huge amounts of data to process

currently a specialized field

sensors!

local aggregation & processing 

intermittent / expensive communication
all the world’s a GenStage and we are merely players
machine learning
servers //



devices // 



core related to data processing

currently a specialized field

local decision making

sensor processing

security detection and action
communication
servers //



devices // 



seems like a solved problem (at first)

latency affects datacenter decisions

assume global wireless availability

expensive to operate

satellites will make us rethink many things
robustness
servers //

devices // 



skating by on speed and reboots

opportunity to reduce cost

coordinate multiple subsystems

deal with hardware failures

hard to physically access devices!
danger of becoming the “Internet of Things that Don’t Work”
making bets
beam
original problems faced by telephony look familiar
had to be efficient

designed scale to out

robustness - OTP

reduce programmer errors



30 years in production
beam is your os
elixir
all benefits of beam, erlang libraries plus…
modern syntax, matching, macros

GenStage, Flow, much more

separation between language and frameworks
phoenix

nerves
low level interop
realtime vs. soft-realtime

perf sensitive code

FPGA access

driver interop

important for security

important for power
ui
user input

drawing primitives / overall model

GPU
distribution
nerves boot images

signed/encrypted deployment

server boot images

revocation lists

signing authorities

more…
example: cars
robustness //



security // 



communications //
many sensors (drive train, cameras, proximity…)

many sub-systems (drive, ABS, self-drive…)

track individual’s location, destinations, habits…

targeted attack opportunities

already shipping with cell modems and connectivity

soon to have full-time satellite communications

servers required for mapping, traffic, more
fin
twitter // @BoydMulterer

github // /boydm
moore’s law enabled higher level languages

multi-core means parallel code 

complexity is the enemy

only two kinds of code:



• performance sensitive

• everything else
developer productivity
trends //
XNA example
games required low-level skill

small shops were locked out of the market

cost to build games increasingly prohibitive 

problem
XNA example
moore’s law enabled higher level languages

multi-core cpu encouraged parallel code 

speed forgave many crimes

trends
market for independent games would be huge 

only two kinds of code:



• performance sensitive

• everything else

build pipelines key to cutting costs

XNA example
bets
moore’s law
mobile driving chip design
perf per watt

many low-powered cores

tremendous implications on HOW we write code
single threaded practices obsolete

most of the coding population is out of date

More Related Content

Similar to ElixirConf 2016 Final Keynote

NTG computer basics seminar
NTG  computer basics seminarNTG  computer basics seminar
NTG computer basics seminar
NTG
 
CSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayCSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment Essay
Rochelle Schear
 
Nt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperNt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis Paper
Joanna Paulsen
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
Anil Dharmapuri
 
6.Resource Exhaustion
6.Resource Exhaustion6.Resource Exhaustion
6.Resource Exhaustion
phanleson
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
shawn_merdinger
 
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTSNETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
Sarika Sawant
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
Bohnsack
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
Bohnsack
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
Bohnsack
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded Systems
Benjim Thomas Mathew
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
Felipe Prado
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Suhreed Sarkar
 
aibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@Madridaibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@Madrid
Tomoya Fujita
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems
Ollie Whitehouse
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
Pete Burnap
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
Rence Montanes
 
"Hints" talk at Walchand College Sangli, March 2017
"Hints" talk at Walchand College Sangli, March 2017"Hints" talk at Walchand College Sangli, March 2017
"Hints" talk at Walchand College Sangli, March 2017
Neeran Karnik
 

Similar to ElixirConf 2016 Final Keynote (20)

NTG computer basics seminar
NTG  computer basics seminarNTG  computer basics seminar
NTG computer basics seminar
 
CSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayCSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment Essay
 
Nt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperNt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis Paper
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
 
6.Resource Exhaustion
6.Resource Exhaustion6.Resource Exhaustion
6.Resource Exhaustion
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTSNETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded Systems
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
aibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@Madridaibo introduction at ROSCon2018@Madrid
aibo introduction at ROSCon2018@Madrid
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
"Hints" talk at Walchand College Sangli, March 2017
"Hints" talk at Walchand College Sangli, March 2017"Hints" talk at Walchand College Sangli, March 2017
"Hints" talk at Walchand College Sangli, March 2017
 

Recently uploaded

Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
kalichargn70th171
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
Paul Brebner
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
manji sharman06
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Vince Scalabrino
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
Alina Yurenko
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
kalichargn70th171
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio, Inc.
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
kalichargn70th171
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
kalichargn70th171
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Microsoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptxMicrosoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptx
jrodriguezq3110
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
confluent
 

Recently uploaded (20)

Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
bgiolcb
bgiolcbbgiolcb
bgiolcb
 
Microsoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptxMicrosoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptx
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
 

ElixirConf 2016 Final Keynote

  • 1. elixir for the next 10 years0 years boyd multerer
  • 2. the basic exercise know what problems you are trying to solve know what trends and disruptions are happening around you build something relevant when it ships, not when you started
  • 4. servers performance per cost security data processing machine learning communications robustness
  • 5. devices (iot) performance per cost security data processing machine learning communications robustness
  • 6. example: game consoles perf per cost // security // scalability // robustness // this is why you don’t just buy a PC……..……….
 cheating & piracy - no physical security hard, even though you’d think it would be necessary keeping all games & consoles up to date is required
  • 8. power drives cost servers // devices // power consumed means heat dissipated power and heat cost real money power consumed impacts battery life sensors use lots of power radios use lots of power hw chosen to fit power and problem envelopes
  • 9. security servers // devices // assume your servers are hacked assume your databases are hacked tremendously tempting targets both devices and data no physical security this is an arms race and will not go away it’s not paranoia if they are out to get you
  • 10. FPGAs (you’ll be friends soon) think extremely large instructions very low power for perf not in addressable space physically unclonable functions (PUFs) not as expensive as you think. Xilinx
  • 11. data processing servers // devices // huge amounts of data to process currently a specialized field sensors! local aggregation & processing intermittent / expensive communication all the world’s a GenStage and we are merely players
  • 12. machine learning servers // devices // core related to data processing currently a specialized field local decision making sensor processing security detection and action
  • 13. communication servers // devices // seems like a solved problem (at first) latency affects datacenter decisions assume global wireless availability expensive to operate satellites will make us rethink many things
  • 14. robustness servers // devices // skating by on speed and reboots opportunity to reduce cost coordinate multiple subsystems deal with hardware failures hard to physically access devices! danger of becoming the “Internet of Things that Don’t Work”
  • 16. beam original problems faced by telephony look familiar had to be efficient designed scale to out robustness - OTP reduce programmer errors 30 years in production beam is your os
  • 17. elixir all benefits of beam, erlang libraries plus… modern syntax, matching, macros GenStage, Flow, much more separation between language and frameworks phoenix nerves
  • 18. low level interop realtime vs. soft-realtime perf sensitive code FPGA access driver interop important for security important for power
  • 19. ui user input drawing primitives / overall model GPU
  • 20. distribution nerves boot images signed/encrypted deployment server boot images revocation lists signing authorities more…
  • 21. example: cars robustness // security // communications // many sensors (drive train, cameras, proximity…) many sub-systems (drive, ABS, self-drive…) track individual’s location, destinations, habits… targeted attack opportunities already shipping with cell modems and connectivity soon to have full-time satellite communications servers required for mapping, traffic, more
  • 23. moore’s law enabled higher level languages multi-core means parallel code complexity is the enemy only two kinds of code: • performance sensitive • everything else developer productivity trends //
  • 24. XNA example games required low-level skill small shops were locked out of the market cost to build games increasingly prohibitive problem
  • 25. XNA example moore’s law enabled higher level languages multi-core cpu encouraged parallel code speed forgave many crimes trends
  • 26. market for independent games would be huge only two kinds of code: • performance sensitive • everything else build pipelines key to cutting costs XNA example bets
  • 27. moore’s law mobile driving chip design perf per watt many low-powered cores tremendous implications on HOW we write code single threaded practices obsolete most of the coding population is out of date