SlideShare a Scribd company logo
The Machine
– a vision for the future of computing
James Salter, Research Manager
Hewlett Packard Labs, Bristol, United Kingdom
The problem we are facing today
2
107
106
105
104
103
102
101
100
1975 1980 1985 1990 1995 2000 2005 2010 2015
The end of cheap hardware
Compute is not keeping up
3
0.3 0.8 1.2 1.8
4.4
7.9
44
0
5
10
15
20
25
30
35
40
45
50
2005 2010 2015 2020 2025
2009
2013
2020
Data
(Zettabytes)
Years
Data nearly doubles
every 2 years
(2013-2020)
Transistors
(thousands)
Single-thread
Performance
(SpecINT)
Frequency
(MHz)
Typical Power
(Watts)
Number of
Cores
The Past 60 Years
4
1950s 1960s 1970s 1980s 1990s 2000s Today
It’s time to rethink
how computers
are built
5
The Machine
6
I/O
Copper
7
Copper
8
Copper
9
From processor-centric computing…
10
Memory
Memory
Memory
Memory
CPU
CPU
CPU
CPU
CPU
CPU
CPU
CPU
Memory
+
Fabric
…to Memory-Driven Computing
Making the memory hierarchy obsolete
11
Massive
Memory
Pool
Faster
More cost per bit
Capacity
Flash Accelerator
CPU
registers
L2 cache
L3 cache
Main Memory
SSD
L1 cache
Hard Disk
Network Drive Array
Network Backup
Archive
Processor
Computer
Universal Memory
Network
Photonics destroys distance
12
Photonics
racks can behave
as a single server
160
Processor-centric computing
Open Architecture
13
Memory
MemoryMemory
Memory
CPU
CPU
CPU
CPU
GPU
ASIC
Quantum
RISC
V
Open
Architecture
Memory-Driven Computing
The Machine security framework
14
The first computer with security
built-in from the ground up
Data always protected:
in use, in flight and at rest
Secure boot and firmware
Runtime monitoring
Access control
Low energy encryption
Protect
Giving The Machine the ability to
protect itself, even against
completely unknown threats
Compromised components
Firmware and kernel tampering
Runtime malware monitoring
Monitoring for data leakage
Detect
Always safe, always
recoverable, without sacrificing
performance
Recovery at the firmware layer
OS, application, and data recovery
Systematic recovery at scale with
minimal human intervention
Recover
Manageability
15
Manageability for The Machine is
automatic and transparent
Shift from Imperative to Declarative
management
Using the power of The Machine
to manage The Machine
Integrated with security
framework
Actionable management system
User requests an end state and the
system calculates and executes the
details – it just works
Leveraging “unlimited memory”
Performing analytics on its own
system information
What kind of world becomes possible?
Machine Learning that can keep up with the now
Training up-to-date deep neural networks in minutes, not weeks
17
Keeping up with
every click, every meme“Tell me the latest news
on the severe weather.”
Contextual ads
Suggested topics
Relevant content
Graph analytics time machine
Massive memory and fast fabrics to ingest all data
18
Fast graph databases and
the ability to look at things
that change over time
“Are there any emerging
new behaviors in my
network?”
Critical node
Remote users
External users
What if we could pre-compute an almost infinite set of “what ifs”?
Optimization over a large search space in real time becomes realistic
19
Effectively infinite memory
can simulate large scale
probabilities, just like in game
algorithms
Solve complex problems
before they happen
We are only just learning what is possible
Thank you
james.salter@hpe.com
21

More Related Content

Similar to The Machine - a vision for the future of computing

Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...
Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...
Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...
exponential-inc
 
Revolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI EraRevolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI Era
PrinceBarpaga
 
Streaming Analytics: It's Not the Same Game
Streaming Analytics: It's Not the Same GameStreaming Analytics: It's Not the Same Game
Streaming Analytics: It's Not the Same Game
Numenta
 
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
Data Driven Innovation
 
Petascale Analytics - The World of Big Data Requires Big Analytics
Petascale Analytics - The World of Big Data Requires Big AnalyticsPetascale Analytics - The World of Big Data Requires Big Analytics
Petascale Analytics - The World of Big Data Requires Big AnalyticsHeiko Joerg Schick
 
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
Mathieu DESPRIEE
 
Big Data & Machine Learning - TDC2013 Sao Paulo
Big Data & Machine Learning - TDC2013 Sao PauloBig Data & Machine Learning - TDC2013 Sao Paulo
Big Data & Machine Learning - TDC2013 Sao Paulo
OCTO Technology
 
Nikravesh australia long_versionkeynote2012
Nikravesh australia long_versionkeynote2012Nikravesh australia long_versionkeynote2012
Nikravesh australia long_versionkeynote2012
Masoud Nikravesh
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Microsoft Dryad
Microsoft DryadMicrosoft Dryad
Microsoft Dryad
Colin Clark
 
Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...
Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...
Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...
Codemotion
 
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
DataScienceConferenc1
 
Executive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docxExecutive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docx
rhetttrevannion
 
Final Draft of IT 402 Presentation
Final Draft of IT 402 PresentationFinal Draft of IT 402 Presentation
Final Draft of IT 402 Presentationmonacofamily
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
jasaniurvi
 
BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...
BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...
BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...
BATbern
 
Sysmech The Zen of Consolidated Network Performance Management
Sysmech The Zen of Consolidated Network Performance ManagementSysmech The Zen of Consolidated Network Performance Management
Sysmech The Zen of Consolidated Network Performance Management
SystemsMechanics
 
Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.
gadisaAdamu
 
Innovations using PowerAI
Innovations using PowerAIInnovations using PowerAI
Innovations using PowerAI
Ganesan Narayanasamy
 

Similar to The Machine - a vision for the future of computing (20)

Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...
Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...
Keynote Address at 2013 CloudCon: Future of Big Data by Richard McDougall (In...
 
Revolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI EraRevolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI Era
 
Streaming Analytics: It's Not the Same Game
Streaming Analytics: It's Not the Same GameStreaming Analytics: It's Not the Same Game
Streaming Analytics: It's Not the Same Game
 
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
 
Petascale Analytics - The World of Big Data Requires Big Analytics
Petascale Analytics - The World of Big Data Requires Big AnalyticsPetascale Analytics - The World of Big Data Requires Big Analytics
Petascale Analytics - The World of Big Data Requires Big Analytics
 
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
 
Big Data & Machine Learning - TDC2013 Sao Paulo
Big Data & Machine Learning - TDC2013 Sao PauloBig Data & Machine Learning - TDC2013 Sao Paulo
Big Data & Machine Learning - TDC2013 Sao Paulo
 
Nikravesh australia long_versionkeynote2012
Nikravesh australia long_versionkeynote2012Nikravesh australia long_versionkeynote2012
Nikravesh australia long_versionkeynote2012
 
Week 3
Week 3Week 3
Week 3
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Microsoft Dryad
Microsoft DryadMicrosoft Dryad
Microsoft Dryad
 
Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...
Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...
Artificial Intelligence in practice - Gerbert Kaandorp - Codemotion Amsterdam...
 
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
 
Executive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docxExecutive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docx
 
Final Draft of IT 402 Presentation
Final Draft of IT 402 PresentationFinal Draft of IT 402 Presentation
Final Draft of IT 402 Presentation
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...
BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...
BAT40 NVIDIA Stampfli Künstliche Intelligenz, Roboter und autonome Fahrzeuge ...
 
Sysmech The Zen of Consolidated Network Performance Management
Sysmech The Zen of Consolidated Network Performance ManagementSysmech The Zen of Consolidated Network Performance Management
Sysmech The Zen of Consolidated Network Performance Management
 
Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.
 
Innovations using PowerAI
Innovations using PowerAIInnovations using PowerAI
Innovations using PowerAI
 

More from James Salter

Security for The Machine: By Design
Security for The Machine: By DesignSecurity for The Machine: By Design
Security for The Machine: By Design
James Salter
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
James Salter
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
James Salter
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
James Salter
 
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer NetworksINC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
James Salter
 
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
James Salter
 
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
James Salter
 
Agents and P2P Networks
Agents and P2P NetworksAgents and P2P Networks
Agents and P2P Networks
James Salter
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
James Salter
 
Lecture: Software Agents and P2P
Lecture: Software Agents and P2PLecture: Software Agents and P2P
Lecture: Software Agents and P2P
James Salter
 
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in GridsINC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
James Salter
 

More from James Salter (11)

Security for The Machine: By Design
Security for The Machine: By DesignSecurity for The Machine: By Design
Security for The Machine: By Design
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
 
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer NetworksINC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
 
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
 
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
 
Agents and P2P Networks
Agents and P2P NetworksAgents and P2P Networks
Agents and P2P Networks
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 
Lecture: Software Agents and P2P
Lecture: Software Agents and P2PLecture: Software Agents and P2P
Lecture: Software Agents and P2P
 
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in GridsINC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
 

Recently uploaded

一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
kywwoyk
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
kywwoyk
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
Amil baba
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
ThalapathyVijay15
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
ArjunJain44
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
eemet
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 

Recently uploaded (9)

一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 

The Machine - a vision for the future of computing

  • 1. The Machine – a vision for the future of computing James Salter, Research Manager Hewlett Packard Labs, Bristol, United Kingdom
  • 2. The problem we are facing today 2
  • 3. 107 106 105 104 103 102 101 100 1975 1980 1985 1990 1995 2000 2005 2010 2015 The end of cheap hardware Compute is not keeping up 3 0.3 0.8 1.2 1.8 4.4 7.9 44 0 5 10 15 20 25 30 35 40 45 50 2005 2010 2015 2020 2025 2009 2013 2020 Data (Zettabytes) Years Data nearly doubles every 2 years (2013-2020) Transistors (thousands) Single-thread Performance (SpecINT) Frequency (MHz) Typical Power (Watts) Number of Cores
  • 4. The Past 60 Years 4 1950s 1960s 1970s 1980s 1990s 2000s Today It’s time to rethink how computers are built
  • 9. 9
  • 11. Making the memory hierarchy obsolete 11 Massive Memory Pool Faster More cost per bit Capacity Flash Accelerator CPU registers L2 cache L3 cache Main Memory SSD L1 cache Hard Disk Network Drive Array Network Backup Archive Processor Computer Universal Memory Network
  • 12. Photonics destroys distance 12 Photonics racks can behave as a single server 160
  • 14. The Machine security framework 14 The first computer with security built-in from the ground up Data always protected: in use, in flight and at rest Secure boot and firmware Runtime monitoring Access control Low energy encryption Protect Giving The Machine the ability to protect itself, even against completely unknown threats Compromised components Firmware and kernel tampering Runtime malware monitoring Monitoring for data leakage Detect Always safe, always recoverable, without sacrificing performance Recovery at the firmware layer OS, application, and data recovery Systematic recovery at scale with minimal human intervention Recover
  • 15. Manageability 15 Manageability for The Machine is automatic and transparent Shift from Imperative to Declarative management Using the power of The Machine to manage The Machine Integrated with security framework Actionable management system User requests an end state and the system calculates and executes the details – it just works Leveraging “unlimited memory” Performing analytics on its own system information
  • 16. What kind of world becomes possible?
  • 17. Machine Learning that can keep up with the now Training up-to-date deep neural networks in minutes, not weeks 17 Keeping up with every click, every meme“Tell me the latest news on the severe weather.” Contextual ads Suggested topics Relevant content
  • 18. Graph analytics time machine Massive memory and fast fabrics to ingest all data 18 Fast graph databases and the ability to look at things that change over time “Are there any emerging new behaviors in my network?” Critical node Remote users External users
  • 19. What if we could pre-compute an almost infinite set of “what ifs”? Optimization over a large search space in real time becomes realistic 19 Effectively infinite memory can simulate large scale probabilities, just like in game algorithms Solve complex problems before they happen
  • 20. We are only just learning what is possible

Editor's Notes

  1. Terabyte -> Petabyte -> Exabyte -> Zettabyte