Feeds

More transistors, Moore’s Law, less juice

“Koomey’s Law” examines power per computation

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

It looks like an accident that Moore’s Law has been shadowed by a parallel phenomenon: that over time, the amount of power required per unit of computation falls. That’s the conclusion of Stanford PhD and consulting professor Jonathan Koomey, whose work has already been dubbed “Koomey’s Law”.

As Koomey writes in a paper to be published by the IEEE, over the timespan for which we’re able to observe the popular interpretation of Moore’s Law, “the electrical efficiency of computing (the number of computations that can be completed per kilowatt-hour of electricity) also doubled” every year-and-a-half.

It’s probably a good thing: otherwise by now we’d probably be in the market for a second Sun, just to power our computers.

In the transistor era, the Moore’s and Koomey’s observations are, in fact, inextricably linked.

How so? Moore’s law states that the complexity of chips would double every two years – and to do achieve that doubling, designers need to make transistors smaller, and they need to manage component power consumption.

Koomey writes that reducing the physical dimensions of a transistor – necessary to pack more devices onto a chip – demands that the transistor’s power consumption is also reduced. If a designer merely shrunk the device, but left its power consumption the same, the power densities on the silicon would “become unimaginable”, his paper states.

Shorter paths (between the transistor's source and drain) and fewer collisions between electrons also help, the paper states.

It’s not just the transistors, though: Koomey also documents (and calls for more study to completely explain) the way in which whole systems also appear to follow the power efficiency he observes in the silicon.

Interestingly, even back in the vacuum tube era, people were working hard to get more computation for less electricity, but for a different reason: heat was a great enemy of vacuum tubes. The curve seems to fit, all the way back to ENIAC.

All of this would be purely academic, except for one thing. As Koomey said to MIT’s Technology Review, most computers are under-utilised. And that wastes electricity. If the world can put the cloud to good use, we could have our computing cake without eating so much power.

And Koomey’s Law also predicts a continuation of what we’re already seeing: more computation for less electricity means more capable smartphones and tablets consuming less power.

Now all we need to do is come up with reasonably efficient software that doesn’t waste processor cycles doing not much.

Koomey’s paper, co-authored by Intel’s Henry Wong, Microsoft’s Stephen Berard, and Marla Sanchez of Carnegie Mellon University, is published in the IEEE Annals in the History of Computing. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.