Wanted: A New Microchip For The AI Era

The coming AI revolution faces a big hurdle: today’s microchips as conventional chip design reaches its limits.

It’s one thing to get a bunch of transistors on an integrated circuit to crunch numbers, even very large ones. But what the brain does is far more difficult. Processing vast amounts of visual data for use by huge, multi-cellular organism is very different from the narrow calculations of conventional math.

The algorithms that will drive tomorrow’s autonomous cars, planes, and programs will be incredibly data-intensive, with needs well beyond what conventional chips were ever designed for. This is one reason for the hype surrounding quantum computing and neurosynaptic chips.

That challenge has a sister predicament: the end of Moore’s Law. The integrated circuit revolution that gave birth to the modern computer, smartphone, and basically all of Silicon Valley is in its twilight.

In the 1960s, Gordon Moore observed that the number of transistors per square inch on integrated circuits was doubling roughly 18 months. That won’t be true after 2020, according to Robert Colwell, formerly of the Defense Advanced Research Projects Agency, or DARPA

That poses a big problem for the Defense Department. In 2014, Defense One asked DARPA director Arati Prabhakar about it:

“There’s a $300 billion-a-year global semiconductor industry that cares deeply about the answer of what comes next,” Prabhakar said. Apple, for example, is said to be working on processor devoted specifically to AI-related tasks. But DARPA has money in the game as well.

The magic of the integrated circuit, the reason why it will be so hard to replace, is that it was “a computational unit that you could use to do the broadest possible class of problems,” she said.

The way forward will be building chips for specific purposes. “If you’re willing to work on specialised classes of problems, you can actually get a lot more out of specialised architectures,” she said. “Special architectures will give us many more steps forward.”

Bottom line: there is no silver-bullet replacement for the integrated circuit on the horizon. But you could achieve something Moore’s Law-like by creating chips that could crunch lots of a specific type of data. Some of these already exist; they’re called application-specific integrated circuit chips, or ASICs.

Recently, DARPA announced several new next-generation chip design initiatives meant to build off that approach.

One, Software Defined Hardware, seeks “a hardware/software system that allows data-intensive algorithms to run at near ASICefficiency without the cost, development time or single application limitations associated with ASIC development.”

A second program, Domain-Specific System on a Chip, takes a dual approach, letting architects “mix and match general purpose, special purpose (e.g., ASICs), and hardware accelerator coprocessors, as well as memory and [input/output] elements, into easily programmed [system on a chip] for applications within specific technology domains.”

In many ways, the premise of the program comes again from Moore’s 1965 paper. In this case, it’s his observation that, eventually, “the matching and tracking of similar components in integrated structures will allow the design of differential amplifiers of greatly improved performance.”

“With an eye toward the times we now live in, he laid out the technical directions to explore when the conditions under which scaling will be the primary means for advancement are no longer met,” DARPA program, managers observed, in the Broad Agency Announcement for “Page Three Investments”, an allusion to the actual page in Moore’s paper where the ideas first appear.

The two programs join several others in the Electronics Resurgence Initiative, a $216 million effort to create chip designs for 2030 to 2050.

DefenseOne

You Might Also Read: 

New IoT Chips See, Think & Act Autonomously:

New Microchip Increases Military Intelligence:

« More Sensitive US Voter Records Leaked
Will Germany's New Social Media Law Kill Free Speech? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.