Feeds

Sun splits DARPA photon-linkage cake with Kotura

Chip-to-chip fatness sought

Internet Security Threat Report 2014

Kotura Inc announced today it has been awarded a $14m contract by Sun Microsystems, to assist with photonic linking of processor cores in future supercomputers and power-limited multicore systems. Sun is carrying out the optical core-hookup work for the US military.

The idea of linking processors optically rather than electronically is to improve speed, bandwidth and power consumption in future systems, whose many powerful cores are expected to severely strain the capacity of normal electronic linkages. The funding comes, not from any normal US military lab, but from DARPA - the Pentagon brainbox apparat which likes to develop answers first and ask what the question was later.

DARPA refers to the effort as Ultraperformance Nanophotonic Intrachip Communications (UNIC), and believes it will help with "relevant computing tasks such as power-starved embedded applications, and supercomputing".

The military notioneers gave Sun $44m to develop UNIC in March. Sun have now shared the cake with Kotura, who specialise in using CMOS technology for chip-to-chip links.

“Optical interconnects increase the bandwidth between chips while reducing power consumption and chip-to-chip latency," said Sun veep Jim Mitchell.

“Kotura is well positioned to deliver silicon photonic elements that will contribute directly to Sun's research efforts on this project... we are on the verge of radically improving the speed of communications among the chips in powerful computing systems, thereby increasing their performance dramatically."

“We have a great working relationship with Sun and DARPA and are now expanding upon that,” added Kotura CTO Mehdi Asghari. He said that Kotura would be targeting "extremely small footprints and ultra low power consumption" suggesting that DARPA are interested in the "power starved embedded applications" end of UNIC here, as much as conventional supercomputing.

There are various military needs for high-performance computing in small systems without a lot of electricity to hand. In particular, synthetic-aperture radar images need a lot of processing, and it saves a lot of satellite bandwidth if this can be done onboard power- and weight-limited platforms, such as small spy satellites and reconnaissance drones. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.