Wanted: A New Microchip For The AI Era

The coming AI revolution faces a big hurdle: today’s microchips as conventional chip design reaches its limits.

It’s one thing to get a bunch of transistors on an integrated circuit to crunch numbers, even very large ones. But what the brain does is far more difficult. Processing vast amounts of visual data for use by huge, multi-cellular organism is very different from the narrow calculations of conventional math.

The algorithms that will drive tomorrow’s autonomous cars, planes, and programs will be incredibly data-intensive, with needs well beyond what conventional chips were ever designed for. This is one reason for the hype surrounding quantum computing and neurosynaptic chips.

That challenge has a sister predicament: the end of Moore’s Law. The integrated circuit revolution that gave birth to the modern computer, smartphone, and basically all of Silicon Valley is in its twilight.

In the 1960s, Gordon Moore observed that the number of transistors per square inch on integrated circuits was doubling roughly 18 months. That won’t be true after 2020, according to Robert Colwell, formerly of the Defense Advanced Research Projects Agency, or DARPA

That poses a big problem for the Defense Department. In 2014, Defense One asked DARPA director Arati Prabhakar about it:

“There’s a $300 billion-a-year global semiconductor industry that cares deeply about the answer of what comes next,” Prabhakar said. Apple, for example, is said to be working on processor devoted specifically to AI-related tasks. But DARPA has money in the game as well.

The magic of the integrated circuit, the reason why it will be so hard to replace, is that it was “a computational unit that you could use to do the broadest possible class of problems,” she said.

The way forward will be building chips for specific purposes. “If you’re willing to work on specialised classes of problems, you can actually get a lot more out of specialised architectures,” she said. “Special architectures will give us many more steps forward.”

Bottom line: there is no silver-bullet replacement for the integrated circuit on the horizon. But you could achieve something Moore’s Law-like by creating chips that could crunch lots of a specific type of data. Some of these already exist; they’re called application-specific integrated circuit chips, or ASICs.

Recently, DARPA announced several new next-generation chip design initiatives meant to build off that approach.

One, Software Defined Hardware, seeks “a hardware/software system that allows data-intensive algorithms to run at near ASICefficiency without the cost, development time or single application limitations associated with ASIC development.”

A second program, Domain-Specific System on a Chip, takes a dual approach, letting architects “mix and match general purpose, special purpose (e.g., ASICs), and hardware accelerator coprocessors, as well as memory and [input/output] elements, into easily programmed [system on a chip] for applications within specific technology domains.”

In many ways, the premise of the program comes again from Moore’s 1965 paper. In this case, it’s his observation that, eventually, “the matching and tracking of similar components in integrated structures will allow the design of differential amplifiers of greatly improved performance.”

“With an eye toward the times we now live in, he laid out the technical directions to explore when the conditions under which scaling will be the primary means for advancement are no longer met,” DARPA program, managers observed, in the Broad Agency Announcement for “Page Three Investments”, an allusion to the actual page in Moore’s paper where the ideas first appear.

The two programs join several others in the Electronics Resurgence Initiative, a $216 million effort to create chip designs for 2030 to 2050.

DefenseOne

You Might Also Read: 

New IoT Chips See, Think & Act Autonomously:

New Microchip Increases Military Intelligence:

« More Sensitive US Voter Records Leaked
Will Germany's New Social Media Law Kill Free Speech? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Bastion Security Group

Bastion Security Group

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini.

SafeShark

SafeShark

SafeShark are Product Security and Telecommunications Infrastructure (PTSI) Act and Radio Equipment Directive (RED) compliance specialists.