wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

EVOLUTION OF THE MIRCOPROCESSOR

profile
Dev Gandhi
Jul 12, 2023
0 Likes
0 Discussions
29 Reads

The hardware revolution that brought about desktop and handheld computing was

the invention of the microprocessor, which contained a processor on a single chip.

Though originally much slower than multichip processors, microprocessors have

continually evolved to the point that they are now much faster for most computa-

tions due to the physics involved in moving information around in sub-nanosecond

timeframes.

 Not only have microprocessors become the fastest general purpose processors

available, they are now multiprocessors; each chip (called a socket) contains multi-

ple processors (called cores), each with multiple levels of large memory caches, and

multiple logical processors sharing the execution units of each core. As of 2010, it is

not unusual for even a laptop to have 2 or 4 cores, each with 2 hardware threads, for

a total of 4 or 8 logical processors.

 Although processors provide very good performance for most forms of

computing, there is increasing demand for numerical computation. Graphical

Processing Units (GPUs) provide efficient computation on arrays of data using

Single-Instruction Multiple Data (SIMD) techniques pioneered in supercomput-

ers. GPUs are no longer used just for rendering advanced graphics, but they are

also used for general numerical processing, such as physics simulations for games

or computations on large spreadsheets. Simultaneously, the CPUs themselves are

gaining the capability of operating on arrays of data—with increasingly power-

ful vector units integrated into the processor architecture of the x86 and AMD64

families.

 Processors and GPUs are not the end of the computational story for the

 modern PC. Digital Signal Processors (DSPs) are also present, for dealing with

streaming signals—such as audio or video. DSPs used to be embedded in I/O

devices, like modems, but they are now becoming first-class computational devices,

especially in handhelds. Other specialized computational devices (fixed function

units) co-exist with the CPU to support other standard computations, such as

encoding/decoding speech and video (codecs), or providing support for encryption

and security.

 To satisfy the requirements of handheld devices, the classic microprocessor

is giving way to the System on a Chip (SoC), where not just the CPUs and caches

are on the same chip, but also many of the other components of the system, such as

DSPs, GPUs, I/O devices (such as radios and codecs), and main memory.

 


Comments ()


Sign in

Read Next

Memory Management in Operating System

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

NETWORK SECURITY RISKS

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Mental Health

Blog banner

Multiple processor scheduling

Blog banner

ZOHO

Blog banner

STARVATION

Blog banner

Meshoo

Blog banner

Processes: Process Description and Control.

Blog banner

Introduction to GIS

Blog banner

Malware Defense

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Not anti-social, but pro-solitude

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Scheduling in Operating Systems

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Layers Of Blockchain

Blog banner

Deadlocks

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Types Of scheduling

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Population

Blog banner

Sage

Blog banner

Cyber Security in Data Breaching

Blog banner

What is Vishing?

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Service Operation

Blog banner

Fault Tolerance

Blog banner

Deadlock

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Cache memory

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Man In The Middle Attack

Blog banner

Explain Kernel in OS

Blog banner

EdTech (Education Technology)

Blog banner

Rain bow

Blog banner

Virtualization

Blog banner

File management

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner