A Microchip To Reshape Artificial Intelligence

A new microchip design has been announced by the computer giant IBM that could power a new generation of much smarter devices that don’t rely on the Cloud or the Internet for their intelligence.

Named NothPole, the new design has the potential to enable smarter, more efficient, network-independent devices. This possibility is opened with a prototype AI chip that is said to be more than a dozen times more energy efficient than current industry-leading products.

Modeled on the human brain, the new chip paves the way for a different sort of AI, one that doesn’t rely on big cloud and data companies like Amazon or Google. It could also have military applications, powering drones, robots and augmented-reality equipment against adversaries who can target electronic emissions. 

IBM claims its 14nm analogue AI chip, which can encode 35 million phase-change memory devices per component, can model up to 17 million parameters. It simulates how the human brain operates, performing computations directly within memory.

Unlike traditional chips that separate memory from processing circuits, the NorthPole chip combines the two, like synapses in the brain that hold and process information based on their connection to other neurons. 

Publishing in the journal Science, IBM researchers say it is a “neural inference architecture that blurs this boundary by eliminating off-chip memory, intertwining compute with memory on-chip, and appearing externally as an active memory.” 

This is an important creation because current computers have at least two characteristics that limit AI development. 

Power Consumption:  The human brain, runs on the equivalent of 12 watts can retain and retrieve the information to sustain a detailed conversation while simultaneously absorbing, correctly interpreting, and making decisions about the enormous amount of sensory data required to drive a car. In contrast, A conventional computer takes 175 watts just one simple task, like processing ay spreadsheet.

This is a huge limiting factor for autonomy and energy inefficiency is one reason why many of today’s AI tools depend on enormous cloud server farms that consume enormous amounts of energy.

Physical Constraints:  Moore's Law is an observation that the number of transistors in a computer chip doubles every two years or so. As the number of transistors increases, so does processing power. The law also states that, as the number of transistors increases, the cost per transistor falls.

Moore's Law is still delivering exponential improvements, albeit at a slower pace. Industry experts have not reached a consensus on exactly when Moore's law will cease to apply, but they do agree that the atomic limit of how many transistors we can fit on a chip is likely to happen soon. 

The future of AI requires innovations in energy efficiency, from the way models are designed down to the hardware that runs them> It is becoming evident that big improvements in AI energy efficiency are essential to keep pace with AI’s rapidly expanding carbon footprint. However, the vision of less power-hungry AI is emerging.

IBM:    IBM:    IBM:   Princeton UniversityUniverity of Washington:   DefenseOneScienceMuseumGroup:   

CarandDriver:   Synopsis:    RealCearDefense:    Techradar:    GROUND:

Image: Mohamed Nohassi 

You Might Also Read: 

Neuromorphic Computing Changes Machine Learning:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« How Cybercriminals Could Be Infiltrating Your Supply Chain
How Businesses Can Avoid Firewall Vulnerabilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Optra Security

Optra Security

Optra Security specializes in information security with a focus on Application Security.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Camel Secure

Camel Secure

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.