Computer Technology Assessing the Evolution Thesis

Total Length: 876 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

The real-time integration to memory management that would lead to rapid advanced in superscalar memory management made possible with RISC-based microprocessors and memory however continued to be driven by IBM and their partners working in conjunction with each other on new developments (Biswas, Carley, Simpson, Middha, Barua, 2006).

Implications of RISC Development on Memory Management Advances

Over the first twenty five years of RISC processor and memory development the key lessons learned in processor-to-memory integration led to breakthroughs including how to make multithreading for 32-bit and higher bit order applications collaborate in memory, how to minimize cycle time and increase cache memory predictability over time (Biswas, Carley, Simpson, Middha, Barua, 2006). Cycle times and cache memory became and still are the two most monitored key performance indicators (KPIs) of system performance in systems due to the progression made in RISC-to-memory integration (Vanhaverbeke, Noorderhaven, 2001). Superscalar memories today reflect the decades of lessons learned with from RISC-based microprocessor development, specifically how to translate multiple memory calls into a single command. Superscalar and pipelining approaches to memory management capitalize on reduced instruction sets of optimize performance by minimizing interrupt calls. The lessons learned from RISC processors are today also reflected in virtualization algorithms used for managing complexes or segments of servers used for running Google and other search-intensive applications as well. Virtualization also has made real-time memory management possible for creating multitenant-based Software-as-a-Service (SaaS) applications (Biswas, Carley, Simpson, Middha, Barua, 2006).
The use of RISC-based approaches to managing memory and the progression from superscalar and pre-emptive multitasking and virtualization of memory management algorithms (Biswas, Carley, Simpson, Middha, Barua, 2006) has also led to advances in security of systems and memory as well. Multi-threaded applications based on the Win32 Application Programming Interface (API) for example have significant security advantages over previous generation shared or collative approaches to managing memory. The progression to multithreaded applications has led to significantly greater levels of security as a result (Biswas, Carley, Simpson, Middha, Barua, 2006).

References

Surupa Biswas, Thomas Carley, Matthew Simpson, Bhuvan Middha, & Rajeev Barua. (2006). Memory overflow protection for embedded systems using run-time checks, reuse, and compression. ACM Transactions on Embedded Computing Systems, 5(4), 719-752.

Xaioyong Chen, & Douglas L. Maskell. (2007). Supporting multiple-input, multiple-output custom functions in configurable processors. Journal of Systems Architecture, 53(5/6), 263.

Deng, Y.. (2008). RISC: A resilient interconnection network for scalable cluster storage systems. Journal of Systems Architecture, 54(1/2), 70.

Johann Grossschadl. (2003). Architectural support for long integer modulo arithmetic on RISC-based smart cards. The International Journal of….....

Need Help Writing Your Essay?