Feeds

Turing's thoughts on Merced

Can his theorem solve the Intel enigma?

  • alert
  • submit to reddit

The essential guide to IT transformation

Updated (The IA-64 articles in the last few days have spawned some interesting correspondence. If you'd like to contribute your thoughts, why not post them in the thread we've opened on our forum? Ed.) One of our Big Blue readers has penned some thoughts on how Alan Turing might have regarded the IA-64 architecture. Turing (1912-1954), for those readers who may not have encountered him, helped found computer science and in the Second World War cracked Nazi Germany's Enigma cipher. Here's what our IBM reader has to say: "Almost nobody has related Intel's proposal with the theoretical works of Turing. "The problem is that the only way to predict what a program will do is to run it (that's a consequence of the Turing theorem). A classic processor executes the program code and knows what happens with the current data (loops, jumps, etc). "It can infer locality relationship from its instruction flow and make on-the-fly optimizations. Meanwhile, the compiler of an non-optimizing VLIW processor such as the IA-64 can only look at the code beforehand and make assumptions about what kind of data that code will process. "And the Turing theorem predicts that the IA-64 pre-compiled optimization will always be inferior to a good on-the-fly RISC processor. At best, the precompiled optimization will yield an optimal path for a given set of assumptions, which may not be true on every run, since run-time data can defeat these assumptions. "I'd really like someone to look closely at the IA-64 architecture in the light of the Turing theorem. I understand that Turing's tumultuous sexual life make him a questionable reference in some Yankee circles, but the oh-so-British Register shouldn't have the same qualms. :-)" There's an Alan Turing home page here. ®

5 things you didn’t know about cloud backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Judge nixes HP deal for director amnesty after $8.8bn Autonomy snafu
Lawyers will have to earn their keep the hard way, says court
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.