SlideShare a Scribd company logo
The Machine
– a vision for the future of computing
James Salter, Research Manager
Hewlett Packard Labs, Bristol, United Kingdom
The problem we are facing today
2
107
106
105
104
103
102
101
100
1975 1980 1985 1990 1995 2000 2005 2010 2015
The end of cheap hardware
Compute is not keeping up
3
0.3 0.8 1.2 1.8
4.4
7.9
44
0
5
10
15
20
25
30
35
40
45
50
2005 2010 2015 2020 2025
2009
2013
2020
Data
(Zettabytes)
Years
Data nearly doubles
every 2 years
(2013-2020)
Transistors
(thousands)
Single-thread
Performance
(SpecINT)
Frequency
(MHz)
Typical Power
(Watts)
Number of
Cores
The Past 60 Years
4
1950s 1960s 1970s 1980s 1990s 2000s Today
It’s time to rethink
how computers
are built
5
The Machine
6
I/O
Copper
7
Copper
8
Copper
9
From processor-centric computing…
10
Memory
Memory
Memory
Memory
CPU
CPU
CPU
CPU
CPU
CPU
CPU
CPU
Memory
+
Fabric
…to Memory-Driven Computing
Making the memory hierarchy obsolete
11
Massive
Memory
Pool
Faster
More cost per bit
Capacity
Flash Accelerator
CPU
registers
L2 cache
L3 cache
Main Memory
SSD
L1 cache
Hard Disk
Network Drive Array
Network Backup
Archive
Processor
Computer
Universal Memory
Network
Photonics destroys distance
12
Photonics
racks can behave
as a single server
160
Processor-centric computing
Open Architecture
13
Memory
MemoryMemory
Memory
CPU
CPU
CPU
CPU
GPU
ASIC
Quantum
RISC
V
Open
Architecture
Memory-Driven Computing
The Machine security framework
14
The first computer with security
built-in from the ground up
Data always protected:
in use, in flight and at rest
Secure boot and firmware
Runtime monitoring
Access control
Low energy encryption
Protect
Giving The Machine the ability to
protect itself, even against
completely unknown threats
Compromised components
Firmware and kernel tampering
Runtime malware monitoring
Monitoring for data leakage
Detect
Always safe, always
recoverable, without sacrificing
performance
Recovery at the firmware layer
OS, application, and data recovery
Systematic recovery at scale with
minimal human intervention
Recover
Manageability
15
Manageability for The Machine is
automatic and transparent
Shift from Imperative to Declarative
management
Using the power of The Machine
to manage The Machine
Integrated with security
framework
Actionable management system
User requests an end state and the
system calculates and executes the
details – it just works
Leveraging “unlimited memory”
Performing analytics on its own
system information
What kind of world becomes possible?
Machine Learning that can keep up with the now
Training up-to-date deep neural networks in minutes, not weeks
17
Keeping up with
every click, every meme“Tell me the latest news
on the severe weather.”
Contextual ads
Suggested topics
Relevant content
Graph analytics time machine
Massive memory and fast fabrics to ingest all data
18
Fast graph databases and
the ability to look at things
that change over time
“Are there any emerging
new behaviors in my
network?”
Critical node
Remote users
External users
What if we could pre-compute an almost infinite set of “what ifs”?
Optimization over a large search space in real time becomes realistic
19
Effectively infinite memory
can simulate large scale
probabilities, just like in game
algorithms
Solve complex problems
before they happen
We are only just learning what is possible
Thank you
james.salter@hpe.com
21

More Related Content

PDF
Big & machine learning
PPTX
Quantum computer
PDF
accumulo summit 2015
PDF
BigDataCSEKeyNote_2012
PDF
The Machine - Vision Of Computing in 2050
PDF
Nikravesh big datafeb2013bt
PDF
HKG18-500K1 - Keynote: Dileep Bhandarkar - Emerging Computing Trends in the D...
PPTX
Security for The Machine: By Design
Big & machine learning
Quantum computer
accumulo summit 2015
BigDataCSEKeyNote_2012
The Machine - Vision Of Computing in 2050
Nikravesh big datafeb2013bt
HKG18-500K1 - Keynote: Dileep Bhandarkar - Emerging Computing Trends in the D...
Security for The Machine: By Design

Similar to The Machine - a vision for the future of computing (20)

PDF
The HPE Machine and Gen-Z - BUD17-503
PDF
Nikravesh australia long_versionkeynote2012
PDF
Linaro connect 2018 keynote final updated
PDF
The Parallel Computing Revolution Is Only Half Over
PDF
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
PDF
Inside Out and Upside Down - FOO Camp 2016 - Peter Coffee
PDF
Pipelining and ILP (Instruction Level Parallelism)
PDF
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
PDF
Hipeac 2018 keynote Talk
PDF
centurylink-business-technology-2020-ebook-br141403
PDF
centurylink-business-technology-2020-ebook-br141403
PPTX
Generation of computers and Its Evolution ppt
PDF
Industrial IoT and the emergence of Edge Computing Navigating the Technologic...
PDF
Centurylink Business Technology in 2020 ebook
PDF
HP Labs: Titan DB on LDBC SNB interactive by Tomer Sagi (HP)
PDF
High Performance Computing: The Essential tool for a Knowledge Economy
PPTX
What Is The Next Level Of AI Technology?
PDF
invited speech at Ge2013, Udine 2013
PPTX
The von Neumann Memory Barrier and Computer Architectures for the 21st Century
PDF
Generations of Computer History and their details.pdf
The HPE Machine and Gen-Z - BUD17-503
Nikravesh australia long_versionkeynote2012
Linaro connect 2018 keynote final updated
The Parallel Computing Revolution Is Only Half Over
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
Inside Out and Upside Down - FOO Camp 2016 - Peter Coffee
Pipelining and ILP (Instruction Level Parallelism)
Memory-Driven Computing. Our vision for the future of computing. (Edmondo Orl...
Hipeac 2018 keynote Talk
centurylink-business-technology-2020-ebook-br141403
centurylink-business-technology-2020-ebook-br141403
Generation of computers and Its Evolution ppt
Industrial IoT and the emergence of Edge Computing Navigating the Technologic...
Centurylink Business Technology in 2020 ebook
HP Labs: Titan DB on LDBC SNB interactive by Tomer Sagi (HP)
High Performance Computing: The Essential tool for a Knowledge Economy
What Is The Next Level Of AI Technology?
invited speech at Ge2013, Udine 2013
The von Neumann Memory Barrier and Computer Architectures for the 21st Century
Generations of Computer History and their details.pdf
Ad

More from James Salter (10)

PPTX
Big data ... for security
PPTX
Accumulo: A Quick Introduction
PPTX
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
PPTX
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
PPT
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PPTX
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
PPT
Agents and P2P Networks
PPT
Lecture - Network Technologies: Peer-to-Peer Networks
PPT
Lecture: Software Agents and P2P
PPTX
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
Big data ... for security
Accumulo: A Quick Introduction
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
Agents and P2P Networks
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture: Software Agents and P2P
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
Ad

Recently uploaded (20)

PDF
Tcl Scripting for EDA.pdf
PPTX
"Fundamentals of Digital Image Processing: A Visual Approach"
PPTX
Fundamentals of Computer.pptx Computer BSC
DOCX
A PROPOSAL ON IoT climate sensor 2.docx
DOCX
Edukasi kultural untuk kita semua maka c
PPTX
Wireless and Mobile Backhaul Market.pptx
PPTX
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
PPTX
A Clear View_ Interpreting Scope Numbers and Features
PPTX
PLC ANALOGUE DONE BY KISMEC KULIM TD 5 .0
PDF
PPT Determiners.pdf.......................
PDF
Dozuki_Solution-hardware minimalization.
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPTX
Embedded for Artificial Intelligence 1.pptx
PPTX
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
PPTX
Operating System Processes_Scheduler OSS
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
PPT
Hypersensitivity Namisha1111111111-WPS.ppt
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PDF
-DIGITAL-INDIA.pdf one of the most prominent
Tcl Scripting for EDA.pdf
"Fundamentals of Digital Image Processing: A Visual Approach"
Fundamentals of Computer.pptx Computer BSC
A PROPOSAL ON IoT climate sensor 2.docx
Edukasi kultural untuk kita semua maka c
Wireless and Mobile Backhaul Market.pptx
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
A Clear View_ Interpreting Scope Numbers and Features
PLC ANALOGUE DONE BY KISMEC KULIM TD 5 .0
PPT Determiners.pdf.......................
Dozuki_Solution-hardware minimalization.
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Dynamic Checkweighers and Automatic Weighing Machine Solutions
Embedded for Artificial Intelligence 1.pptx
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
Operating System Processes_Scheduler OSS
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
Hypersensitivity Namisha1111111111-WPS.ppt
unit1d-communitypharmacy-240815170017-d032dce8.pptx
-DIGITAL-INDIA.pdf one of the most prominent

The Machine - a vision for the future of computing

  • 1. The Machine – a vision for the future of computing James Salter, Research Manager Hewlett Packard Labs, Bristol, United Kingdom
  • 2. The problem we are facing today 2
  • 3. 107 106 105 104 103 102 101 100 1975 1980 1985 1990 1995 2000 2005 2010 2015 The end of cheap hardware Compute is not keeping up 3 0.3 0.8 1.2 1.8 4.4 7.9 44 0 5 10 15 20 25 30 35 40 45 50 2005 2010 2015 2020 2025 2009 2013 2020 Data (Zettabytes) Years Data nearly doubles every 2 years (2013-2020) Transistors (thousands) Single-thread Performance (SpecINT) Frequency (MHz) Typical Power (Watts) Number of Cores
  • 4. The Past 60 Years 4 1950s 1960s 1970s 1980s 1990s 2000s Today It’s time to rethink how computers are built
  • 9. 9
  • 11. Making the memory hierarchy obsolete 11 Massive Memory Pool Faster More cost per bit Capacity Flash Accelerator CPU registers L2 cache L3 cache Main Memory SSD L1 cache Hard Disk Network Drive Array Network Backup Archive Processor Computer Universal Memory Network
  • 12. Photonics destroys distance 12 Photonics racks can behave as a single server 160
  • 14. The Machine security framework 14 The first computer with security built-in from the ground up Data always protected: in use, in flight and at rest Secure boot and firmware Runtime monitoring Access control Low energy encryption Protect Giving The Machine the ability to protect itself, even against completely unknown threats Compromised components Firmware and kernel tampering Runtime malware monitoring Monitoring for data leakage Detect Always safe, always recoverable, without sacrificing performance Recovery at the firmware layer OS, application, and data recovery Systematic recovery at scale with minimal human intervention Recover
  • 15. Manageability 15 Manageability for The Machine is automatic and transparent Shift from Imperative to Declarative management Using the power of The Machine to manage The Machine Integrated with security framework Actionable management system User requests an end state and the system calculates and executes the details – it just works Leveraging “unlimited memory” Performing analytics on its own system information
  • 16. What kind of world becomes possible?
  • 17. Machine Learning that can keep up with the now Training up-to-date deep neural networks in minutes, not weeks 17 Keeping up with every click, every meme“Tell me the latest news on the severe weather.” Contextual ads Suggested topics Relevant content
  • 18. Graph analytics time machine Massive memory and fast fabrics to ingest all data 18 Fast graph databases and the ability to look at things that change over time “Are there any emerging new behaviors in my network?” Critical node Remote users External users
  • 19. What if we could pre-compute an almost infinite set of “what ifs”? Optimization over a large search space in real time becomes realistic 19 Effectively infinite memory can simulate large scale probabilities, just like in game algorithms Solve complex problems before they happen
  • 20. We are only just learning what is possible

Editor's Notes

  • #4: Terabyte -> Petabyte -> Exabyte -> Zettabyte