Thermodynamic Computing - A New Computer Architecture

All matter and energy in the universe obeys the laws of thermodynamics, which dictate how energy and heat behave in any system. These principles have inspired a new approach to computing called Thermodynamic Computing, where the natural fluctuations and noise of energy are harnessed to perform computations more efficiently.

Thermodynamic Computing has the potential of dramatically improving our ability to leverage the most advanced AI models, while reducing energy consumption by orders of magnitude. 

Today’s computer architecture is digital. Whether it is a computer in your pocket or on your desktop or a server in the cloud, you are using a transistor based system. If you use a Computer Processor Unit (CPU), a Graphical Processing Unit (GPU) or a Text Processing Unit (TPU), you are using a device made up of digital switches and digital memory. 

New quantum-based architectures are also being developed which leverage the ability to engineer systems that operate on quantum mechanical. These go beyond simple digital systems since they can exploit quantum effects like superposition, entanglement, and quantum tunnelling. 

Thermodynamic Computing is a third approach. It is not based on transistors or qubits. It is based on the ability to capture and use energy from the continuous motion and of all matter.

At a molecular level, all matter is always in motion. Even when cooled to the theoretical limits of cold, matter still vibrates. Warmer matter vibrates more. With vibrations of charged particles come disruptions of the electromagnetic field and noise that spreads beyond just collisions of molecules. Designers of digital computers and researchers building quantum systems fight this reality of continuous noise every day. Architects building new thermodynamic computing approaches embrace the noise. 

The thermodynamic reality of matter and its inherent noise is like a noisy ocean full of waves and constant movement.  This reality of the physical world can be used the way a surfer harnesses the noisy waves of the sea. A surfer does not fight the wave, a surfer uses the wave.

The goal of Thermodynamic Computing is to smartly channel the constant noise of matter into useful computing power. Rather than resisting these forces, as traditional digital and quantum systems often do, this new architecture embraces them, turning a natural source of randomness into an asset. In doing so, it promises a more energy-efficient future for AI and neural network models. Its exponents say that Thermodynamic Computing has the potential to transform our approach to computational power, reducing the barriers imposed by energy limitations and paving the way for advancements that align more closely with the fundamental laws of the universe.

The US National Science Foundation (NSF) estimates that computers use between 5% and 9% of global generated power, but at current growth rates, that could reach 20% by 2030.  But previous work by researchers suggests modern computers are grossly inefficient: Biological systems, by contrast, are about 100,000 times more energy-efficient than human-built computers. 

The primary motivations for a general thermodynamic theory of computation is to find new ways to reduce the energy consumption of real-world machines. 

Thermodynamic computing is particularly well-suited for searching complex energy landscapes that leverage both rapid device fluctuations and the ability to search a large space in parallel, addressing  combinatorial optimisation problems and sampling many-variable probability distributions.

NSF   |   HPCWire   |   Science Daily   |   Oodlaloop   |   Rafał Wiatrowski / LinkedIn  |  Wikipedia

Image: Viktor Forgacs

You Might Also Read: 

The International Race To Lead In Quantum Technology:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Regulator Will Investigate Google
EU To Strengthen Cyber Defence In Healthcare   »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

Blind Insight

Blind Insight

Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfection.