Language Selection

English French German Italian Portuguese Spanish

Nvidia scientist calls for expanded research into parallelism

Filed under
Hardware

Expanded research is needed into techniques for identifying and preserving parallelism in chip applications, according to chip maker Nvidia's chief scientist.

Comparing the futures of general-purpose CPUs and graphics processors (GPUs), David Kirk told the 17th Hot Chips conference on the Stanford Univeristy campus here on Tuesday (Aug. 16) that a crisis looms in programming technology. He said this could not only blight the future CPU market but also bring an end to improvements in graphics performance despite continued improvements in GPUs.

"If we look at the situation of general-purpose CPUs," Kirk said, "we see architects moving rapidly to multithreading and multicore designs. But we don't see a lot more threads to run. What parallelism there may be in algorithms is often concealed or lost altogether in the programming process."

Kirk grounded his pessimism in the experiences of game developers trying to exploit new multicore CPU chips. "We are already seeing some games limited by CPU throughput. We can render images faster than the CPU can send us the data," Kirk said. "But when game developers try to use dual-core CPUs to help, we have seen virtually no benefit to the second CPU core. And if the developer doesn't clearly understand the interactions of the cores with the caches, we have seen the application actually run slower on a dual-core machine."

Kirk contrasted this situation against the entirely different structure inside the GPU. "Graphics has been called embarrassingly parallel," he said. "In effect, each stage in our pipeline, each vertex in the scene and each pixel in the image is independent. And we have put a lot of effort into not concealing this parallelism with programming."

This allows a GPU developer to simply add more vertex processors and shading engines to handle more vertices and more pixels in parallel, as process technology allows. "We are limited by chip area, not by parallelism," Kirk observed.

Full Story.

More in Tux Machines

today's howtos

Security Leftovers

  • London Calling: Two-Factor Authentication Phishing From Iran
    This report describes an elaborate phishing campaign against targets in Iran’s diaspora, and at least one Western activist. The ongoing attacks attempt to circumvent the extra protections conferred by two-factor authentication in Gmail, and rely heavily on phone-call based phishing and “real time” login attempts by the attackers. Most of the attacks begin with a phone call from a UK phone number, with attackers speaking in either English or Farsi. The attacks point to extensive knowledge of the targets’ activities, and share infrastructure and tactics with campaigns previously linked to Iranian threat actors. We have documented a growing number of these attacks, and have received reports that we cannot confirm of targets and victims of highly similar attacks, including in Iran. The report includes extra detail to help potential targets recognize similar attacks. The report closes with some security suggestions, highlighting the importance of two-factor authentication.
  • Ins0mnia: Unlimited Background Time and Covert Execution on Non-Jailbroken iOS Devices
    FireEye mobile researchers discovered a security vulnerability that allowed an iOS application to continue to run, for an unlimited amount of time, even if the application was terminated by the user and not visible in the task switcher. This flaw allowed any iOS application to bypass Apple background restrictions. We call this vulnerability Ins0mnia.
  • Why is the smart home insecure? Because almost nobody cares
    It's easy to laugh-and-point at Samsung over its latest smart-thing disaster: after all, it should have already learned its lesson from the Smart TV debacle, right? Except, of course, that wherever you see “Smart Home”, “Internet of Things”, “cloud” and “connected” in the same press release, there's a security debacle coming. It might be Nest, WeMo, security systems, or home gateways – but it's all the same.
  • Critical PayPal XSS vulnerability left accounts open to attack
    PayPal has patched a security vulnerability which could have been used by hackers to steal users' login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian 'vulnerabilities hunter' Ebrahim Hegazy -- ironically on PayPal's Secure Payments subdomain.
  • Important Notice Regarding Public Availability of Stable Patches
    Grsecurity has existed for over 14 years now. During this time it has been the premier solution for hardening Linux against security exploits and served as a role model for many mainstream commercial applications elsewhere. All modern OSes took our lead and implemented to varying degrees a number of security defenses we pioneered; some have even been burned into silicon in newer processors. Over the past decade, these defenses (a small portion of those we've created and have yet to release) have single-handedly caused the greatest increase in security for users worldwide.
  • Finland detains Russian accused of U.S. malware crimes
    Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal.
  • Finland confirms arrest of Russian citizen accused of crimes in the US
    Finnish authorities have confirmed the detention of Maxim Senakh, a Russian citizen accused of committing malware crimes in the US. The Russian Foreign Ministry has expressed concern and called on Finland to respect international law.
  • More than 80% of healthcare IT leaders say their systems have been compromised
    Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG. The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said. The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.
  • Removal of SSLv3 from LibreSSL
  • Kansas seeks to block release of voting machine paper tapes
    The top election official in Kansas has asked a Sedgwick County judge to block the release of voting machine tapes sought by a Wichita mathematician who is researching statistical anomalies favoring Republicans in counts coming from large precincts in the November 2014 general election.

Firefox 40.0.3 Arrives in All Ubuntu OSes

Canonical have announced that the latest Firefox 40.0.3 version has been made available in the repositories for the users of Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS. Read more

Migrate from Proprietary Software to Linux to Create Cost Savings

Amongst the top IT trends of the moment is the development of Linux Containers. Financial and technical investors, Linuxsoftware programmers and customers believe that Linux Containers will transform the way organisations manage their Linux environments from deployment to maintenance. A recent survey by Red Hat and Techvalidate says that 56% of the respondents plan to use Linux containers as vehicles for rolling out web and eCommerce over the next two years. The respondents included a number of Fortune 500 companies and public sector organisations. Any development in the world of e-Commerce is definitely worth taking a look. Read more