Welcome to the era of radical innovation
Another emerging technology that may replace or more likely augment microprocessors is quantum computing, something both NASA and the NSA are working on, as are most other major nations.
The end of Moore's Law was a topic of discussion at the recent SC13 supercomputing conference. Experts see instability and much uncertainty ahead now that the technology we rely on today can no longer be expected to improve at a regular, predictable pace.
Marc Snir, director of the Mathematics and Computer Science Division at the Argonne National Laboratory, and a computer science professor at the University of Illinois at Urbana-Champaign, told SC13 attendees (see slides) that alternate technologies are not yet ready.
Christopher Willard, chief research officer at Intersect360 Research, said that the era of buying commercial off-the-shelf products to assemble a high-performance system is coming to an end. "The market should then be entering a new phase of experimentation, and computer architecture innovations," he said.
The demise of Moore's Law is already evident in the high-performance computing world.
If Moore's Law continued to hold true, the U.S. would have an exascale system in 2018, instead of the early 2020s, as now predicted.
A 1 gigaflop system was developed in 1988 and nine years later work was completed on a 1 teraflop system. In 2008, work on a 1 petaflop system was finished. A petaflop is a thousand teraflops, or one quadrillion floating-point operations per second.
The end of Moore's Law isn't as urgent of a concern for the device makers at CES as it is for supercomputing researchers.
But there is a shift in themes at CES -- the focus has moved away from smaller, faster, better gadgets to the Internet of Things. The underlying message is: True computing power is measured by the ability of a mobile platform to control and track a multitude of physical and virtual objects over a network. But that message might work for just so long.
The problem that high-performance computing faces in reaching exascale will also eventually confront the device makers at CES, which was launched in 1967, two years after Gordon Moore delivered the paper outlining Moore's Law.
The problem the device makers at CES face is that Moore's Law ends for everyone.
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov, or subscribe to Patrick's RSS feed . His email address is email@example.com.
- How a private Dell works with customers, and sees its rivals
- Update: SanDisk agrees to pay $1.1 billion flash storage maker Fusion-io
- CompTIA now offers its research without charge
- Microsoft's new CEO and his first-100-days plan
- Personal history may thrust new Microsoft CEO into visa debate
- As Dell cuts, Apple adds jobs in Austin
- Dell cuts 'small percentage' of workforce
- Lenovo's Motorola, IBM server buys will likely get strict U.S. security review
- Welcome to the era of radical innovation
- China passes Japan to become world's 2nd largest IT market
Read more about Hardware in Computerworld's Hardware Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Simplifying Product Design In A Complex World Product design engineering has moved far beyond the confines of ever-more powerful workstations. Companies can't afford to restrict projects to using only local...
- A Reference Architecture for the Internet of Things The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- How to Reduce Hardware & Infrastructure Costs Through Data In this paper, we take a look at how organizations are revisiting their network and server architecture in a bid to address the...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Hardware White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!