Feeds

Microsoft super sizes multi-threaded tripe

Pretty sure that we might be ready

High performance access to file storage

Comment Herb and pepper crusted Kobe steak medallions presented on a bed of arugula and baby spring greens tossed in a lemon fennel vinaigrette with baby red and yellow pear tomatoes; haricot verts; toasted sweet and spicy walnuts and crumbled Point Reyes blue cheese presented on the side; and a garnish of puff pastry triangles topped with a balsamic reduction. That's what we were eating when Craig Mundie told us that Microsoft would have tons of multi-threaded software ready for Intel and AMD's upcoming, multi-core chips.

Mundie, Microsoft's chief research and strategy officer, supplied the tripe yesterday, while workers in Microsoft's Mountain View kitchen tossed the salad. The executive tried his best to convince attendees of the "New Software Industry" conference that Microsoft will harness the immense processing power that Intel and AMD plan to ship in the next few years. Judging by the applause, many of the attendees were swallowing.

Mundie's midday talk covered a lot of familiar ground. Developers have lost their - and pardon us because he really did say this - "free lunch" due to the multi-core processor shift. In the good old days, you crafted some adequate code. Then, Intel and AMD released ever faster processors that made that code perform better and better.

With multi-core chips, the developers of old face some pressing challenges. Intel and AMD have given up on trying to speed individual cores much past 3.0GHz. So, you need to write more complex software that can spread across all of the cores well in order to see significant performance gains.

This is a big deal in both the server and consumer software worlds, although the server crowd has done more work thus far to embrace mutli-core chips. On the desktop, you're just looking at video game developers, Adobe and a only a handful of other companies that have multi-threaded code ready.

Microsoft, to its credit, has multi-threaded the calculations in Office Excel 2007. But that's about where the credit ends.

Intel and AMD executives fail to hide their disappointment with Microsoft well on the multi-threaded software front.

During a speech last June, Intel SVP Pat Gelsinger said the following:

"A couple of years ago, I had a discussion with Bill Gates (about the multi-core products). He was just in disbelief. He said, 'We can't write software to keep up with that.'"

Gates ordered the Intel executive to keep pumping out faster product. "No, Bill, it's not going to work that way," Gelsinger informed him.

Microsoft has at least come around from a marketing standpoint with Mundie saying all the right, positive things.

He asked the "New Software Industry" audience to retain skepticism around some of the trends they're seeing in the software industry. Sure, there's a lot of buzz surrounding Google's web-based productivity software and a host of other server-side applications. And, okay, okay, current, dual-core chips seem only barely able to handle Vista.

But . . .

"One has to question whether this is the way it will be for a long period of time or will something change," Mundie said.

The PC will rise once again as the software darling thanks to multi-core chips, Mundie suggested.

"There is going to be a need to harness all of this power."

Microsoft doesn't know for sure what applications will drive the second coming of the PC revolution, but the company feels confident that a shift will occur in the next five (+/- 2) years. Customers will want to use up their abundant local horsepower rather than relying on the "cloud" - aka servers - to manage the work.

Of course, only the very optimistic folks in the industry think developers will craft all that much multi-threaded code in the next few years that can really make use of chips with eight, 16 and 32 cores. And you can bet that Microsoft will be bringing up the rear in this battle, which is a serious problem on the desktop since most of the consumer code revolves around Redmond's timetable.

"I happen to be pretty confident that we will solve these problems," Mundie said.

Where'd that bucket of tripe go? We're starving. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.