Thermodynamic Computing - A New Computer Architecture

All matter and energy in the universe obeys the laws of thermodynamics, which dictate how energy and heat behave in any system. These principles have inspired a new approach to computing called Thermodynamic Computing, where the natural fluctuations and noise of energy are harnessed to perform computations more efficiently.

Thermodynamic Computing has the potential of dramatically improving our ability to leverage the most advanced AI models, while reducing energy consumption by orders of magnitude. 

Today’s computer architecture is digital. Whether it is a computer in your pocket or on your desktop or a server in the cloud, you are using a transistor based system. If you use a Computer Processor Unit (CPU), a Graphical Processing Unit (GPU) or a Text Processing Unit (TPU), you are using a device made up of digital switches and digital memory. 

New quantum-based architectures are also being developed which leverage the ability to engineer systems that operate on quantum mechanical. These go beyond simple digital systems since they can exploit quantum effects like superposition, entanglement, and quantum tunnelling. 

Thermodynamic Computing is a third approach. It is not based on transistors or qubits. It is based on the ability to capture and use energy from the continuous motion and of all matter.

At a molecular level, all matter is always in motion. Even when cooled to the theoretical limits of cold, matter still vibrates. Warmer matter vibrates more. With vibrations of charged particles come disruptions of the electromagnetic field and noise that spreads beyond just collisions of molecules. Designers of digital computers and researchers building quantum systems fight this reality of continuous noise every day. Architects building new thermodynamic computing approaches embrace the noise. 

The thermodynamic reality of matter and its inherent noise is like a noisy ocean full of waves and constant movement.  This reality of the physical world can be used the way a surfer harnesses the noisy waves of the sea. A surfer does not fight the wave, a surfer uses the wave.

The goal of Thermodynamic Computing is to smartly channel the constant noise of matter into useful computing power. Rather than resisting these forces, as traditional digital and quantum systems often do, this new architecture embraces them, turning a natural source of randomness into an asset. In doing so, it promises a more energy-efficient future for AI and neural network models. Its exponents say that Thermodynamic Computing has the potential to transform our approach to computational power, reducing the barriers imposed by energy limitations and paving the way for advancements that align more closely with the fundamental laws of the universe.

The US National Science Foundation (NSF) estimates that computers use between 5% and 9% of global generated power, but at current growth rates, that could reach 20% by 2030.  But previous work by researchers suggests modern computers are grossly inefficient: Biological systems, by contrast, are about 100,000 times more energy-efficient than human-built computers. 

The primary motivations for a general thermodynamic theory of computation is to find new ways to reduce the energy consumption of real-world machines. 

Thermodynamic computing is particularly well-suited for searching complex energy landscapes that leverage both rapid device fluctuations and the ability to search a large space in parallel, addressing  combinatorial optimisation problems and sampling many-variable probability distributions.

NSF   |   HPCWire   |   Science Daily   |   Oodlaloop   |   Rafał Wiatrowski / LinkedIn  |  Wikipedia

Image: Viktor Forgacs

You Might Also Read: 

The International Race To Lead In Quantum Technology:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Regulator Will Investigate Google
EU To Strengthen Cyber Defence In Healthcare   »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

CSC Cyber Games

CSC Cyber Games

CSC Cyber Games is an innovative platform dedicated to empowering individuals with the tools and knowledge to excel in the ever-evolving world of cybersecurity.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.

Securitribe

Securitribe

Securitribe provides cybersecurity and compliance solutions, including vCISO services, ISO27001, and ASD Essential 8 advisory, helping businesses and government strengthen security & compliance.