Feeds

Sun's chip gurus theorize about obliterating IBM and Intel

Nearing proximity

Choosing a cloud hosting partner with confidence

Sun's researchers, for example, showed off a prototype switch last week, during a Labs open house for reporters.

The switch code-named Sedna relies on two logic chips linked to three so-called bridge chips with the proximity communications technology.

“One benefit is the I/O bandwidth increase that we get from this technology,” said Sun researcher Hans Eberle. “We achieve up to 10 terabits per second per square mm of chip overlap.”

Sun's prototype system is based on the ACTA telco standard and has four 10GigE ports and layer 2 switching. It works with off-the-shelf line cards and Sun's proprietary switch blade.

Should all go according to plan, Sun could build a flat, single-stage switch fabric capable of scaling to thousands of ports with multiple Tbps of throughput.

(It should be noted that, er, the switch wasn't in working order when we saw it and that Sun reckons a really solid test machine won't arrive for 18 months or so.)

A few microns between victory and defeat

As mentioned, Sun is still concerned about the packaging issues related to the proximity communications technology.

On the plus side, Sun's technology would allow for less wires, which would translate into smaller chips. In addition, Sun would not need the ceramic and plastic packaging used with today's chips. So, it could remove faulty chips or insert faster chips with relative ease.

On the downside is the alignment issue and concerns about removing heat form the systems.

Sun had promised the proximity communications as part of its bid for a lucrative DARPA high performance computing contract. That promise included linking second generation Rock processors with the technology. By our estimates, that puts Sun three to four years away from using proximity communications. It would also seem to indicate quite a bit of confidence on Sun's part for the technology.

One researcher described this technology as "a really big deal” for Sun. The company has Sutherland's sweeping patents and some patents purchased from MIT researchers backing up its attack. So, if the technology works as hoped, Sun would enjoy a big time lead over rivals.

The same researcher confessed that Sun could find itself well behind the competition if the proximity communications technology fails. Sun would need to catch up with IBM and others' multi-chip module expertise in a hurry.

That Moore's Law thing

In the best of all possible worlds, Sun thinks that proximity communications technology could take some pressure off chip makers.

Moore's Law gives us more transistor density every 18 to 24 months. Keeping up with the law requires chip makers to spend billions of dollars and seemingly rewrite the laws of physics ever two to four years.

Sun argues that Fabs could worry less about, say, what follows 45nm and focus more on linking 45nm parts together with proximity communications to keep up with Moore's Law.

"Instead of moving along with the Fab technology, you can stay at 45nm and just put more silicon in your system,” said Robert Drost, a Sun researcher.

We see Drost's point. Intel, however, would certainly argue for adding more transistors per chip at the same time as linking chips together. But then, Intel is so damned ambitious.

Sun also plans to make use of technology such as 3-D memory and optical networking with its proximity technology-based parts. The company expects to reveal more about its packaging progress next year. ®

Bootnote

A number of other research projects caught our eye while at Sun.

Coders will want to check out Fortess - a programming language for high performance computing applications. This work also grew out of Sun's failed DARPA bid and should help developers write multi-threaded code.

The Celeste peer-to-peer storage project seemed moving as well, although there was no one around at the booth to tell us about the work. Tsk, tsk.

And then there was the transactional memory stuff that went way over our head but is "very important," according to some smart folks.

Internet Security Threat Report 2014

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.