Neuromorphic Data Microscope
|
|
- Blake Porter
- 6 years ago
- Views:
Transcription
1 Neuromorphic Data Microscope CLSAC 16 October 28, 2016 David Follett Founder, CEO Lewis Rhodes Labs (LRL) Slide 1
2 History Neuroscience Neuronal Spiking Models STPU Sandia LDRD State Density Behavior Prediction HAANA Neuromorphic Signal Processing Image/video Mixed Telemetry Neuronal Information Theory Pre-Attentive Processing $/Performance >100,000x Behavioral Lexicon Pervasive Analysis Dynamic Reconfiguration $/Performance Power Weight >100,000x <100,000x <1,000,000x Behavioral Analysis Forensics (aka learning) Prediction Neuromorphic Filters/Sensors ->Cyber<- Big Data Telemetry Slide 2
3 Vision Neuromorphic Processing Units (s) stunningly power efficient at pattern matching Data Center & Cloud Impact profoundly changes economics Slide 3
4 Why Neuromorphic? Power/op & Cost/op 1 GbE >500 IDS Servers 500,000 W 14,000 lbs $2,500,000 1 GbE 40 GbE 5 FPGA Neuromorphic Cyber Microscopes All 4,036 Emerging Threats PCREs (1/16) Pervasive examination (no directives) 2,500 W 200 lbs $125,000 1 ASIC Neuromorphic Cyber Microscope Performance Gains Power/op: Cost/op: 50 W, 1 lb $500 > 1M > 1M Slide 4
5 Control Unit Neuromorphic is very Different Memory Input Input Legacy Von Neumann Architecture (CPU) Arithmetic Logic Unit Mapping/Efficacy Memory Temporal/Spatial Memory Integrators Output Output Complex processor Extraordinarily flexible Data processing via sequential instructions Simple memory Neuromorphic Processing Unit () Simple processor Massively parallel integrators Complex memory Data processing via efficacy & temporal/spatial mapping Processing is multi-dimensional Slide 5
6 Computer Science Perspective (Un)Structured Input Stream(s) Neuromorphic Processor PCIe Structured Output Policy Recognition: Find Ex n, n>>1 Behavioral: Find!Ex n, n>>1 Metadata Stream Behavior Match Classification Filter Prediction Pipeline Slide 6
7 Some Interesting Features integrates key mission requirements, ex., Context switching Dynamic programmability Behavioral characterization Time & Order invariance Pervasive analysis Basic statistical operations Current device uses a single neuron type Can extend HW architecture through novel neurons Example: more complex statistical operations Slide 7
8 Scalability Device Bandwidth x Expressions = Constant System Arbitrary Depth & Width FPGA 2.5 Gb/s x 1,000 Expressions 5 Gb/s x 500 Expressions 10 Gb/s x 250 Expressions etc. ASIC 20 Gb/s x 20,000 Expressions 40 Gb/s x 10,000 Expressions 80 Gb/s x 5,000 Expressions etc. Input Stream Output Stream Control Output Slide 8
9 Latest Product 6 or 7 PCRE Compiler IDS Patches Neuromorphic Data Microscope Version 4.0 Neuromorphic Processor Intrusion Detection System ex. WaterSlide, Proprietary Commodity Server DMA Driver PCIe Slide 9
10 Standards Hide Complexity PCI Card Application (Suricata, etc.) APIs Result DMA Driver Data Stream Cmd & Cntl Neuro Compiler Config Loader PCIe Bus Control Logic Sandia ported to Quiz Kid (aka WaterSlide) Signatures Regex, etc. {A,B,C, } Compiler Compiled Elements A=[a.1,a.2,a.3 ] B=[b.1] C=[c.1,c.2,c.3] Slide 10
11 Throughput Efficiency 250 Measured Throughput vs Block Size Thoughput (MB/s) Theoretical max 1Gb/s Enet, Full Gabe DMA ,000 10, ,000 Block Size (Bytes) Note 1: Theoretical Max bounded by context switching Note 2: Un-optimized generic Altera DMA Interface Note 3: CUDA style DMA planed for next generation Slide 11
12 Graph Analytics Scaling Example Cloud Database /Switch Control & Configuration Graph Analytics Computers Integrated Filters Integrated Switches Data Streams Parallel Application Support Applications completely Independent No performance degradation Integrated cloud extremely scalable Slide 12
13 CYBER APPLICATION Slide 13
14 Exemplar Intel Community IDS Facility B NAS Blade Servers Software Sensors Blade Servers Facility A NAS Network Security Internet Policy Control Suricata, etc. Alerts Operational Intelligence Splunk, etc. analysts Slide 14
15 Practical Considerations Hardware sensor cost extremely high ex. 10GbE IDS >$100k Cost limits number & resolution of HW sensors Software sensors often resource intensive ex. ROP detectors require most of the CPU Cost limits number & resolution of SW sensors Analyst s priority, reduce False Negatives Achieved by detuning sensors, ie. large # of False Positives Major source of noise, direct result of sensor cost Detuned sensors are more vulnerable to attack Spoofing & Flooding are common Slide 15
16 Analyst s Top Priority Signal/Noise is killing analyst community Network Internet Hardware Sensors Operational Intelligence Splunk, etc. analysts Servers Cloud Software Sensors Storage NAS, SAN False Positives must be Reduced True Positive False Positive False Negative Slide 16
17 Root Cause: Resolution True Positives (TP) Potential False Positives (FP) Expression Coverage State-of-the-Art Sensors ex. Suricata Cost limits resolution TPs identified but Many FPs captured Splunk database, Low Accuracy Poor signal/noise ratio It s still a haystack S/N is killing the analysts Slide 17
18 Neuro: Resolution Cyber Microscope Neuromorphic Speed creates resolution Same number of TPs Dramatically fewer FPs Greater Accuracy Higher Signal/Noise ratio Profound impact on analysts True Positives (TP) Potential False Positives (FP) Expression Coverage Slide 18
19 Analyst s Second Priority Reduce False Negatives Network Internet Servers Cloud Hardware Sensors Software Sensors Operational Intelligence Splunk, etc. analysts Behavioral Prediction Required Storage NAS, SAN True Positive False Positive False Negative Slide 19
20 Root Cause: Temporal Variance Simplest form of behavior prediction Attack Vector Classes Temporal Variants True Positives (TP) Temporal Variants, Potential (FN) Expression Coverage State-of-the-Art Sensors ex. Suricata Temporal variance is common Shifting offsets Re-ordering Easily implemented by attacker Very costly to address Pervasive analysis Associative analysis Slide 20
21 Neuro: Temporal Variance Attack Vector Classes Temporal Variants True Positives (TP) Temporal Variants, Potential (FN) Expression Coverage Neuromorphic Pervasive analysis is innate Evaluates every byte Limiting this costs resources Associative analysis is innate Metadata reordering Reduced False Negatives FN Behavioral Prediction Profound impact on Analysts Slide 21
22 Neuro Addresses Core Issues Internet Network Neuro Sensors Operational Intelligence Splunk, etc. analysts Servers Cloud Storage NAS, SAN Reduced False Positives Reduced False Negatives Increased True Positives True Positive False Positive False Negative Slide 22
23 Operational Control Application cyber, image/video analysis, novel event detection, graph analytics, speech recognition, etc. Behavioral Identify!t n, n>>1 ex., syscall graph Recognition Find t n, n>>1 ex., signatures Data Stream(s) Result(s) Slide 23
24 IC Analyst s Vision Facility B Facility A NAS Blade Servers Blade Servers NAS Network Security Policy Control Suricata, etc. Internet Alerts Operational Intelligence Splunk, etc. analysts Slide 24
25 Cyber Microscope Product Rollout 1 st Generation (FPGA) 2 nd Generation (ASIC) 3 nd Generation (ASIC) Intrusion Detection System Acceleration IDS IDS System on Chip Security Alert Management Acceleration SAM Host Behavioral Analysis Behavioral Slide 25
26 Conclusions Neuromorphic will revolutionize cyber defense Dramatic reductions in power/op FPGA, >1,000x ASIC, >1,000,000x Plethora of powerful novel features Order & time invariant, Sessionization, Behavioral prediction Operational readiness is close Compatible with existing standards & infrastructure Sandia ported Quiz Kid (aka WaterSlide), 4 week effort 4 rd gen FPGA systems available in November Slide 26
P51: High Performance Networking
P51: High Performance Networking Lecture 6: Programmable network devices Dr Noa Zilberman noa.zilberman@cl.cam.ac.uk Lent 2017/18 High Throughput Interfaces Performance Limitations So far we discussed
More informationBrainchip OCTOBER
Brainchip OCTOBER 2017 1 Agenda Neuromorphic computing background Akida Neuromorphic System-on-Chip (NSoC) Brainchip OCTOBER 2017 2 Neuromorphic Computing Background Brainchip OCTOBER 2017 3 A Brief History
More informationMaximizing heterogeneous system performance with ARM interconnect and CCIX
Maximizing heterogeneous system performance with ARM interconnect and CCIX Neil Parris, Director of product marketing Systems and software group, ARM Teratec June 2017 Intelligent flexible cloud to enable
More informationAltera SDK for OpenCL
Altera SDK for OpenCL A novel SDK that opens up the world of FPGAs to today s developers Altera Technology Roadshow 2013 Today s News Altera today announces its SDK for OpenCL Altera Joins Khronos Group
More informationThe S6000 Family of Processors
The S6000 Family of Processors Today s Design Challenges The advent of software configurable processors In recent years, the widespread adoption of digital technologies has revolutionized the way in which
More informationPanelists. Moderator: Dr. John H. Saunders, MITRE Corporation
SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationCyber-physical intrusion detection on a robotic vehicle
WIFS 2015 The 7th IEEE International Workshop on Information Forensics and Security Rome, Italy, 16-19 November, 2015 Cyber-physical intrusion detection on a robotic vehicle Tuan Vuong, George Loukas and
More informationXPU A Programmable FPGA Accelerator for Diverse Workloads
XPU A Programmable FPGA Accelerator for Diverse Workloads Jian Ouyang, 1 (ouyangjian@baidu.com) Ephrem Wu, 2 Jing Wang, 1 Yupeng Li, 1 Hanlin Xie 1 1 Baidu, Inc. 2 Xilinx Outlines Background - FPGA for
More informationSOFTWARE-DEFINED BLOCK STORAGE FOR HYPERSCALE APPLICATIONS
SOFTWARE-DEFINED BLOCK STORAGE FOR HYPERSCALE APPLICATIONS SCALE-OUT SERVER SAN WITH DISTRIBUTED NVME, POWERED BY HIGH-PERFORMANCE NETWORK TECHNOLOGY INTRODUCTION The evolution in data-centric applications,
More informationDDN. DDN Updates. DataDirect Neworks Japan, Inc Nobu Hashizume. DDN Storage 2018 DDN Storage 1
1 DDN DDN Updates DataDirect Neworks Japan, Inc Nobu Hashizume DDN Storage 2018 DDN Storage 1 2 DDN A Broad Range of Technologies to Best Address Your Needs Your Use Cases Research Big Data Enterprise
More informationIndustrial Control Systems Providing Advanced Threat Detection
Industrial Control Systems Providing Advanced Threat Detection Gene Stevens, Co-Founder & CTO, ProtectWise Richard Welch, Senior Software Engineer, ProtectWise November 2016 2 AGENDA Introduction Intro
More informationLecture 1: Gentle Introduction to GPUs
CSCI-GA.3033-004 Graphics Processing Units (GPUs): Architecture and Programming Lecture 1: Gentle Introduction to GPUs Mohamed Zahran (aka Z) mzahran@cs.nyu.edu http://www.mzahran.com Who Am I? Mohamed
More informationAdaptable Intelligence The Next Computing Era
Adaptable Intelligence The Next Computing Era Hot Chips, August 21, 2018 Victor Peng, CEO, Xilinx Pervasive Intelligence from Cloud to Edge to Endpoints >> 1 Exponential Growth and Opportunities Data Explosion
More informationGzip Compression Using Altera OpenCL. Mohamed Abdelfattah (University of Toronto) Andrei Hagiescu Deshanand Singh
Gzip Compression Using Altera OpenCL Mohamed Abdelfattah (University of Toronto) Andrei Hagiescu Deshanand Singh Gzip Widely-used lossless compression program Gzip = LZ77 + Huffman Big data needs fast
More informationIntegrating FPGAs in High Performance Computing A System, Architecture, and Implementation Perspective
Integrating FPGAs in High Performance Computing A System, Architecture, and Implementation Perspective Nathan Woods XtremeData FPGA 2007 Outline Background Problem Statement Possible Solutions Description
More informationDDN. DDN Updates. Data DirectNeworks Japan, Inc Shuichi Ihara. DDN Storage 2017 DDN Storage
DDN DDN Updates Data DirectNeworks Japan, Inc Shuichi Ihara DDN A Broad Range of Technologies to Best Address Your Needs Protection Security Data Distribution and Lifecycle Management Open Monitoring Your
More informationCommunication Pattern Anomaly Detection in Process Control Systems
Communication Pattern Anomaly Detection in Process Control Systems Sponsored by the Department of Energy National SCADA Test Bed Program Managed by the National Energy Technology Laboratory The views herein
More informationQLogic 16Gb Gen 5 Fibre Channel for Database and Business Analytics
QLogic 16Gb Gen 5 Fibre Channel for Database Assessment for Database and Business Analytics Using the information from databases and business analytics helps business-line managers to understand their
More informationCSE 591: GPU Programming. Introduction. Entertainment Graphics: Virtual Realism for the Masses. Computer games need to have: Klaus Mueller
Entertainment Graphics: Virtual Realism for the Masses CSE 591: GPU Programming Introduction Computer games need to have: realistic appearance of characters and objects believable and creative shading,
More informationSDA: Software-Defined Accelerator for Large- Scale DNN Systems
SDA: Software-Defined Accelerator for Large- Scale DNN Systems Jian Ouyang, 1 Shiding Lin, 1 Wei Qi, Yong Wang, Bo Yu, Song Jiang, 2 1 Baidu, Inc. 2 Wayne State University Introduction of Baidu A dominant
More informationComputer Architecture s Changing Definition
Computer Architecture s Changing Definition 1950s Computer Architecture Computer Arithmetic 1960s Operating system support, especially memory management 1970s to mid 1980s Computer Architecture Instruction
More informationSDA: Software-Defined Accelerator for Large- Scale DNN Systems
SDA: Software-Defined Accelerator for Large- Scale DNN Systems Jian Ouyang, 1 Shiding Lin, 1 Wei Qi, 1 Yong Wang, 1 Bo Yu, 1 Song Jiang, 2 1 Baidu, Inc. 2 Wayne State University Introduction of Baidu A
More informationCondusiv s V-locity VM Accelerates Exchange 2010 over 60% on Virtual Machines without Additional Hardware
openbench Labs Executive Briefing: March 13, 2013 Condusiv s V-locity VM Accelerates Exchange 2010 over 60% on Virtual Machines without Additional Hardware Optimizing I/O for Increased Throughput and Reduced
More informationFlash Controller Solutions in Programmable Technology
Flash Controller Solutions in Programmable Technology David McIntyre Senior Business Unit Manager Computer and Storage Business Unit Altera Corp. dmcintyr@altera.com Flash Memory Summit 2012 Santa Clara,
More informationCatapult: A Reconfigurable Fabric for Petaflop Computing in the Cloud
Catapult: A Reconfigurable Fabric for Petaflop Computing in the Cloud Doug Burger Director, Hardware, Devices, & Experiences MSR NExT November 15, 2015 The Cloud is a Growing Disruptor for HPC Moore s
More informationFlash In the Data Center
Flash In the Data Center Enterprise-grade Morgan Littlewood: VP Marketing and BD Violin Memory, Inc. Email: littlewo@violin-memory.com Mobile: +1.650.714.7694 7/12/2009 1 Flash in the Data Center Nothing
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationINT G bit TCP Offload Engine SOC
INT 10011 10 G bit TCP Offload Engine SOC Product brief, features and benefits summary: Highly customizable hardware IP block. Easily portable to ASIC flow, Xilinx/Altera FPGAs or Structured ASIC flow.
More informationQLogic/Lenovo 16Gb Gen 5 Fibre Channel for Database and Business Analytics
QLogic/ Gen 5 Fibre Channel for Database Assessment for Database and Business Analytics Using the information from databases and business analytics helps business-line managers to understand their customer
More informationPower dissipation! The VLSI Interconnect Challenge. Interconnect is the crux of the problem. Interconnect is the crux of the problem.
The VLSI Interconnect Challenge Avinoam Kolodny Electrical Engineering Department Technion Israel Institute of Technology VLSI Challenges System complexity Performance Tolerance to digital noise and faults
More informationToward a Memory-centric Architecture
Toward a Memory-centric Architecture Martin Fink EVP & Chief Technology Officer Western Digital Corporation August 8, 2017 1 SAFE HARBOR DISCLAIMERS Forward-Looking Statements This presentation contains
More informationData Sheet Fujitsu M10-4 Server
Data Sheet Fujitsu M10-4 Server High-performance, highly reliable midrange server that is ideal for data center integration and virtualization The Fujitsu M10-4 The Fujitsu M10-4 server can be configured
More informationA Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012
A Peek at the Future Intel s Technology Roadmap Jesse Treger Datacenter Strategic Planning October/November 2012 Intel's Vision This decade we will create and extend computing technology to connect and
More informationCreating PCI Express Links in Intel FPGAs
Creating PCI Express Links in Intel FPGAs Course Description This course provides all necessary theoretical and practical know how to create PCI Express links in Intel FPGAs. The course goes into great
More informationThe Network Processor Revolution
The Network Processor Revolution Fast Pattern Matching and Routing at OC-48 David Kramer Senior Design/Architect Market Segments Optical Mux Optical Core DWDM Ring OC 192 to OC 768 Optical Mux Carrier
More informationModels HP Security Management System XL Appliance with 500-IPS System License
Overview Models HP Security System Appliance with 25-IPS System License HP Security System XL Appliance with 500-IPS System License HP vsms for VMware vsphere single host Software License HP High Availability
More informationMaximizing Server Efficiency from μarch to ML accelerators. Michael Ferdman
Maximizing Server Efficiency from μarch to ML accelerators Michael Ferdman Maximizing Server Efficiency from μarch to ML accelerators Michael Ferdman Maximizing Server Efficiency with ML accelerators Michael
More informationZynq-7000 All Programmable SoC Product Overview
Zynq-7000 All Programmable SoC Product Overview The SW, HW and IO Programmable Platform August 2012 Copyright 2012 2009 Xilinx Introducing the Zynq -7000 All Programmable SoC Breakthrough Processing Platform
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationCYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta
CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC
More informationECE 8823: GPU Architectures. Objectives
ECE 8823: GPU Architectures Introduction 1 Objectives Distinguishing features of GPUs vs. CPUs Major drivers in the evolution of general purpose GPUs (GPGPUs) 2 1 Chapter 1 Chapter 2: 2.2, 2.3 Reading
More informationIsilon: Raising The Bar On Performance & Archive Use Cases. John Har Solutions Product Manager Unstructured Data Storage Team
Isilon: Raising The Bar On Performance & Archive Use Cases John Har Solutions Product Manager Unstructured Data Storage Team What we ll cover in this session Isilon Overview Streaming workflows High ops/s
More informationExtreme Storage Performance with exflash DIMM and AMPS
Extreme Storage Performance with exflash DIMM and AMPS 214 by 6East Technologies, Inc. and Lenovo Corporation All trademarks or registered trademarks mentioned here are the property of their respective
More informationIntelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales
Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,
More informationRon Emerick, Oracle Corporation
PCI Express PRESENTATION Virtualization TITLE GOES HERE Overview Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.
More informationCompany. Intellectual Property. Headquartered in the Silicon Valley
Headquartered in the Silicon Valley Company Founded in 2012 as a result of more than 5 years of research and development operations Assembled a very skilled and experienced A-class team in engineering
More informationFPGA & Hybrid Systems in the Enterprise Drivers, Exemplars and Challenges
Bob Blainey IBM Software Group 27 Feb 2011 FPGA & Hybrid Systems in the Enterprise Drivers, Exemplars and Challenges Workshop on The Role of FPGAs in a Converged Future with Heterogeneous Programmable
More informationHPE ProLiant Gen10. Franz Weberberger Presales Consultant Server
HPE ProLiant Gen10 Franz Weberberger Presales Consultant Server Introducing a new generation compute experience from HPE Agility A better way to deliver business results Security A better way to protect
More informationSpring 2011 Prof. Hyesoon Kim
Spring 2011 Prof. Hyesoon Kim Application Geometry Rasterizer CPU Each stage cane be also pipelined The slowest of the pipeline stage determines the rendering speed. Frames per second (fps) Executes on
More informationOracle Exadata: Strategy and Roadmap
Oracle Exadata: Strategy and Roadmap - New Technologies, Cloud, and On-Premises Juan Loaiza Senior Vice President, Database Systems Technologies, Oracle Safe Harbor Statement The following is intended
More informationThe Nios II Family of Configurable Soft-core Processors
The Nios II Family of Configurable Soft-core Processors James Ball August 16, 2005 2005 Altera Corporation Agenda Nios II Introduction Configuring your CPU FPGA vs. ASIC CPU Design Instruction Set Architecture
More information소프트웨어기반고성능침입탐지시스템설계및구현
소프트웨어기반고성능침입탐지시스템설계및구현 KyoungSoo Park Department of Electrical Engineering, KAIST M. Asim Jamshed *, Jihyung Lee*, Sangwoo Moon*, Insu Yun *, Deokjin Kim, Sungryoul Lee, Yung Yi* Department of Electrical
More informationEnergy scalability and the RESUME scalable video codec
Energy scalability and the RESUME scalable video codec Harald Devos, Hendrik Eeckhaut, Mark Christiaens ELIS/PARIS Ghent University pag. 1 Outline Introduction Scalable Video Reconfigurable HW: FPGAs Implementation
More informationDNNBuilder: an Automated Tool for Building High-Performance DNN Hardware Accelerators for FPGAs
IBM Research AI Systems Day DNNBuilder: an Automated Tool for Building High-Performance DNN Hardware Accelerators for FPGAs Xiaofan Zhang 1, Junsong Wang 2, Chao Zhu 2, Yonghua Lin 2, Jinjun Xiong 3, Wen-mei
More informationImproving Packet Processing Performance of a Memory- Bounded Application
Improving Packet Processing Performance of a Memory- Bounded Application Jörn Schumacher CERN / University of Paderborn, Germany jorn.schumacher@cern.ch On behalf of the ATLAS FELIX Developer Team LHCb
More informationData Sheet Fujitsu M10-4S Server
Data Sheet Fujitsu M10-4S Server Flexible and scalable system that delivers high performance and high availability for mission-critical enterprise applications The Fujitsu M10-4S The Fujitsu M10-4S server
More informationData Sources for Cyber Security Research
Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,
More informationOUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.
Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent
More informationGetting it Right: Testing Storage Arrays The Way They ll be Used
Getting it Right: Testing Storage Arrays The Way They ll be Used Peter Murray Virtual Instruments Flash Memory Summit 2017 Santa Clara, CA 1 The Journey: How Did we Get Here? Storage testing was black
More informationWhy AI Frameworks Need (not only) RDMA?
Why AI Frameworks Need (not only) RDMA? With Design and Implementation Experience of Networking Support on TensorFlow GDR, Apache MXNet, WeChat Amber, and Tencent Angel Bairen Yi (byi@connect.ust.hk) Jingrong
More informationMeasuring Intrusion Detection Capability: An Information- Theoretic Approach
Measuring Intrusion Detection Capability: An Information- Theoretic Approach Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee Georgia Tech Boris Skoric Philips Research Lab Outline Motivation Problem Why
More informationFacilitating IP Development for the OpenCAPI Memory Interface Kevin McIlvain, Memory Development Engineer IBM. Join the Conversation #OpenPOWERSummit
Facilitating IP Development for the OpenCAPI Memory Interface Kevin McIlvain, Memory Development Engineer IBM Join the Conversation #OpenPOWERSummit Moral of the Story OpenPOWER is the best platform to
More informationADVANCED IN-MEMORY COMPUTING USING SUPERMICRO MEMX SOLUTION
TABLE OF CONTENTS 2 WHAT IS IN-MEMORY COMPUTING (IMC) Benefits of IMC Concerns with In-Memory Processing Advanced In-Memory Computing using Supermicro MemX 1 3 MEMX ARCHITECTURE MemX Functionality and
More informationAgenda. Introduction Network functions virtualization (NFV) promise and mission cloud native approach Where do we want to go with NFV?
August, 2018 Agenda Introduction Network functions virtualization (NFV) promise and mission cloud native approach Where do we want to go with NFV? 2 Miroslaw Walukiewicz I m from Gdansk, Poland. 25 years
More informationNext Generation Computing Architectures for Cloud Scale Applications
Next Generation Computing Architectures for Cloud Scale Applications Steve McQuerry, CCIE #6108, Manager Technical Marketing #clmel Agenda Introduction Cloud Scale Architectures System Link Technology
More informationCUDA Optimizations WS Intelligent Robotics Seminar. Universität Hamburg WS Intelligent Robotics Seminar Praveen Kulkarni
CUDA Optimizations WS 2014-15 Intelligent Robotics Seminar 1 Table of content 1 Background information 2 Optimizations 3 Summary 2 Table of content 1 Background information 2 Optimizations 3 Summary 3
More informationReconfigurable Computing. Introduction
Reconfigurable Computing Tony Givargis and Nikil Dutt Introduction! Reconfigurable computing, a new paradigm for system design Post fabrication software personalization for hardware computation Traditionally
More informationOCP Engineering Workshop - Telco
OCP Engineering Workshop - Telco Low Latency Mobile Edge Computing Trevor Hiatt Product Management, IDT IDT Company Overview Founded 1980 Workforce Approximately 1,800 employees Headquarters San Jose,
More informationImproving DPDK Performance
Improving DPDK Performance Data Plane Development Kit (DPDK) was pioneered by Intel as a way to boost the speed of packet API with standard hardware. DPDK-enabled applications typically show four or more
More informationThomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia
Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto, ON, Canada Motivation: IoT
More informationEvaluating On-Node GPU Interconnects for Deep Learning Workloads
Evaluating On-Node GPU Interconnects for Deep Learning Workloads NATHAN TALLENT, NITIN GAWANDE, CHARLES SIEGEL ABHINAV VISHNU, ADOLFY HOISIE Pacific Northwest National Lab PMBS 217 (@ SC) November 13,
More informationOPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY. Key Takeaways
OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY This is the second of two white papers that describe how the shift from monolithic, purpose-built, network
More informationExtending PCI-Express in MicroTCA Platforms. Whitepaper. Joey Maitra of Magma & Tony Romero of Performance Technologies
Extending PCI-Express in MicroTCA Platforms Whitepaper Joey Maitra of Magma & Tony Romero of Performance Technologies Introduction: The introduction of MicroTCA platforms has opened the door for AdvancedMC
More informationApproximate Search and Data Reduction Algorithms
Approximate Search and Data Reduction Algorithms Research Questions Kyle Porter NTNU Gjøvik Outline of Presentation Introduction: Problems General Goals Research Questions Brief theoretical/practical background
More informationThe New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments
The New Normal Unique Challenges When Monitoring Hybrid Cloud Environments The Evolving Cybersecurity Landscape Every day, the cybersecurity landscape is expanding around us. Each new device connected
More informationBig Data Systems on Future Hardware. Bingsheng He NUS Computing
Big Data Systems on Future Hardware Bingsheng He NUS Computing http://www.comp.nus.edu.sg/~hebs/ 1 Outline Challenges for Big Data Systems Why Hardware Matters? Open Challenges Summary 2 3 ANYs in Big
More informationDeep Learning Performance and Cost Evaluation
Micron 5210 ION Quad-Level Cell (QLC) SSDs vs 7200 RPM HDDs in Centralized NAS Storage Repositories A Technical White Paper Rene Meyer, Ph.D. AMAX Corporation Publish date: October 25, 2018 Abstract Introduction
More informationSAP HANA. Jake Klein/ SVP SAP HANA June, 2013
SAP HANA Jake Klein/ SVP SAP HANA June, 2013 SAP 3 YEARS AGO Middleware BI / Analytics Core ERP + Suite 2013 WHERE ARE WE NOW? Cloud Mobile Applications SAP HANA Analytics D&T Changed Reality Disruptive
More informationECE 1160/2160 Embedded Systems Design. Midterm Review. Wei Gao. ECE 1160/2160 Embedded Systems Design
ECE 1160/2160 Embedded Systems Design Midterm Review Wei Gao ECE 1160/2160 Embedded Systems Design 1 Midterm Exam When: next Monday (10/16) 4:30-5:45pm Where: Benedum G26 15% of your final grade What about:
More informationParallelizing FPGA Technology Mapping using GPUs. Doris Chen Deshanand Singh Aug 31 st, 2010
Parallelizing FPGA Technology Mapping using GPUs Doris Chen Deshanand Singh Aug 31 st, 2010 Motivation: Compile Time In last 12 years: 110x increase in FPGA Logic, 23x increase in CPU speed, 4.8x gap Question:
More informationDeveloping a Data Driven System for Computational Neuroscience
Developing a Data Driven System for Computational Neuroscience Ross Snider and Yongming Zhu Montana State University, Bozeman MT 59717, USA Abstract. A data driven system implies the need to integrate
More informationIBM Hortonworks Design Guide 14-Sep-17 v1
IBM Hortonworks Design Guide Main Benefits MAXIMIZE THE NETWORK Maximize datacenter connectivity ROI through: Density, Scale, Performance OPEN THE NETWORK Leverage new technologies that increase functionality,
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationNetwork Design Considerations for Grid Computing
Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom
More informationDetection and Analysis of Threats to the Energy Sector (DATES)
Detection and Analysis of Threats to the Energy Sector (DATES) Sponsored by the Department of Energy National SCADA Test Bed Program Managed by the National Energy Technology Laboratory The views herein
More informationIBM Power 9 надежная платформа для развертывания облаков. Ташкент. Юрий Кондратенко Cross-Brand Sales Specialist
IBM Power 9 надежная платформа для развертывания облаков Ташкент Юрий Кондратенко Cross-Brand Sales Specialist Power Systems Family POWER9 servers and solutions are built to crush today s most advanced
More informationFPGA-based Supercomputing: New Opportunities and Challenges
FPGA-based Supercomputing: New Opportunities and Challenges Naoya Maruyama (RIKEN AICS)* 5 th ADAC Workshop Feb 15, 2018 * Current Main affiliation is Lawrence Livermore National Laboratory SIAM PP18:
More informationDetecting malware even when it is encrypted
Detecting malware even when it is encrypted Machine Learning for network HTTPS analysis František Střasák strasfra@fel.cvut.cz @FrenkyStrasak Sebastian Garcia sebastian.garcia@agents.fel.cvut.cz @eldracote
More informationHigh performance Computing and O&G Challenges
High performance Computing and O&G Challenges 2 Seismic exploration challenges High Performance Computing and O&G challenges Worldwide Context Seismic,sub-surface imaging Computing Power needs Accelerating
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationIntel and SAP Realising the Value of your Data
Intel and SAP Realising the Value of your Data Scott Pendrey Intel EMEA, Server Product Manager In the Future Systems will be workload optimized Infrastructure will be software defined Analytics will be
More informationHardware Acceleration in Computer Networks. Jan Kořenek Conference IT4Innovations, Ostrava
Hardware Acceleration in Computer Networks Outline Motivation for hardware acceleration Longest prefix matching using FPGA Hardware acceleration of time critical operations Framework and applications Contracted
More informationDeep Learning Performance and Cost Evaluation
Micron 5210 ION Quad-Level Cell (QLC) SSDs vs 7200 RPM HDDs in Centralized NAS Storage Repositories A Technical White Paper Don Wang, Rene Meyer, Ph.D. info@ AMAX Corporation Publish date: October 25,
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.
More informationPerformance Characterization, Prediction, and Optimization for Heterogeneous Systems with Multi-Level Memory Interference
The 2017 IEEE International Symposium on Workload Characterization Performance Characterization, Prediction, and Optimization for Heterogeneous Systems with Multi-Level Memory Interference Shin-Ying Lee
More informationPERG-Rx: An FPGA-based Pattern-Matching Engine with Limited Regular Expression Support for Large Pattern Database. Johnny Ho
PERG-Rx: An FPGA-based Pattern-Matching Engine with Limited Regular Expression Support for Large Pattern Database Johnny Ho Supervisor: Guy Lemieux Date: September 11, 2009 University of British Columbia
More informationGPU Programming. Lecture 1: Introduction. Miaoqing Huang University of Arkansas 1 / 27
1 / 27 GPU Programming Lecture 1: Introduction Miaoqing Huang University of Arkansas 2 / 27 Outline Course Introduction GPUs as Parallel Computers Trend and Design Philosophies Programming and Execution
More informationCS4670: Computer Vision
CS4670: Computer Vision Noah Snavely Lecture 6: Feature matching and alignment Szeliski: Chapter 6.1 Reading Last time: Corners and blobs Scale-space blob detector: Example Feature descriptors We know
More information