Thermodynamic Computing - A New Computer Architecture

All matter and energy in the universe obeys the laws of thermodynamics, which dictate how energy and heat behave in any system. These principles have inspired a new approach to computing called Thermodynamic Computing, where the natural fluctuations and noise of energy are harnessed to perform computations more efficiently.

Thermodynamic Computing has the potential of dramatically improving our ability to leverage the most advanced AI models, while reducing energy consumption by orders of magnitude. 

Today’s computer architecture is digital. Whether it is a computer in your pocket or on your desktop or a server in the cloud, you are using a transistor based system. If you use a Computer Processor Unit (CPU), a Graphical Processing Unit (GPU) or a Text Processing Unit (TPU), you are using a device made up of digital switches and digital memory. 

New quantum-based architectures are also being developed which leverage the ability to engineer systems that operate on quantum mechanical. These go beyond simple digital systems since they can exploit quantum effects like superposition, entanglement, and quantum tunnelling. 

Thermodynamic Computing is a third approach. It is not based on transistors or qubits. It is based on the ability to capture and use energy from the continuous motion and of all matter.

At a molecular level, all matter is always in motion. Even when cooled to the theoretical limits of cold, matter still vibrates. Warmer matter vibrates more. With vibrations of charged particles come disruptions of the electromagnetic field and noise that spreads beyond just collisions of molecules. Designers of digital computers and researchers building quantum systems fight this reality of continuous noise every day. Architects building new thermodynamic computing approaches embrace the noise. 

The thermodynamic reality of matter and its inherent noise is like a noisy ocean full of waves and constant movement.  This reality of the physical world can be used the way a surfer harnesses the noisy waves of the sea. A surfer does not fight the wave, a surfer uses the wave.

The goal of Thermodynamic Computing is to smartly channel the constant noise of matter into useful computing power. Rather than resisting these forces, as traditional digital and quantum systems often do, this new architecture embraces them, turning a natural source of randomness into an asset. In doing so, it promises a more energy-efficient future for AI and neural network models. Its exponents say that Thermodynamic Computing has the potential to transform our approach to computational power, reducing the barriers imposed by energy limitations and paving the way for advancements that align more closely with the fundamental laws of the universe.

The US National Science Foundation (NSF) estimates that computers use between 5% and 9% of global generated power, but at current growth rates, that could reach 20% by 2030.  But previous work by researchers suggests modern computers are grossly inefficient: Biological systems, by contrast, are about 100,000 times more energy-efficient than human-built computers. 

The primary motivations for a general thermodynamic theory of computation is to find new ways to reduce the energy consumption of real-world machines. 

Thermodynamic computing is particularly well-suited for searching complex energy landscapes that leverage both rapid device fluctuations and the ability to search a large space in parallel, addressing  combinatorial optimisation problems and sampling many-variable probability distributions.

NSF   |   HPCWire   |   Science Daily   |   Oodlaloop   |   Rafał Wiatrowski / LinkedIn  |  Wikipedia

Image: Viktor Forgacs

You Might Also Read: 

The International Race To Lead In Quantum Technology:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Regulator Will Investigate Google

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Athena Forensics

Athena Forensics

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

eLearnSecurity

eLearnSecurity

eLearnSecurity is an innovator in the IT Security training market providing quality online courses paired with highly practical virtual labs.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.

Simpson Associates

Simpson Associates

Simpson Associates is a Data Transformation and managed services provider that helps organisations gain valuable insights from their data and make better-informed decisions.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.