50s-movies-google

IBM and the Supercomputer – The Realities of the ‘50s Sci-fi Movies May Be Coming to Fruition

The Supercomputer

In the 1950s, there were a ton of space movies. With the Space Race heating up between the U.S. and Russia, fears were at an all-time high.

Some of these movies were full of hope, while others were full of ominous warnings. In these films, the characters almost always used a spaceship. And, often, the ship was run by a fantasy version of an extremely intelligent computer.

Now, the realities of these ‘50s sci-fi movies may be coming to fruition.

The Union of Forces

A few weeks ago, the U.S. Air Force and computer juggernaut IBM announced that they will be teaming up to create a supercomputer. This sounds amazing, but what does a supercomputer do?

First of all, a supercomputer runs at the highest rate and efficiency that’s currently possible. Supercomputers are expensive and sophisticated machines capable of handling massive amounts of data.

It’s impressive enough to think about a computer with that much “brainpower,” but the Air Force-IBM supercomputer will eventually grow to become as complex as a human brain.

In 2011, a group of scientists created a supercomputer that mimicked how the human brain thinks. It all began with encoding the equivalent of 256 neurons within the supercomputer. But, ever since then, the artificial brain has been expanding its neural network.

From 256 neurons, the “artificial brain” now sits at an astounding 64 million-neuron equivalent. Not only that, but there are also 16 million “synapses” in this supercomputer.

To put it simply, this supercomputer is currently running at 10 percent of the human brain. And it will be up to the equivalent of a human by 2025.

How the Supercomputer Works

The supercomputer can be broken down into a couple of different sections. First, the entire brain runs on a 64-chip array from IBM. This means all the information being gathered is processed and powered by these 64 chips. These chips come from IBM’s TrueNorth Neurosynaptic System, which is based on the structure of the human brain.

The TrueNorth Neurosynaptic Network System focuses on pattern recognition and sensory information — two factors that separate types of artificial intelligence. Pattern recognition, in particular, is critical. The supercomputer will also be able to process the symbolism of images, audio and visual input in real time. The ability to quickly process and categorize stimuli will make this computer function like a flesh-and-blood brain.

Beyond that, IBM hopes to merge this system with a traditional, logic-based computer. Combining these two systems is like connecting the left and right sides of the brain, and that’s what makes this supercomputer so fascinating and exciting.

To further boggle the mind, this supercomputer, which currently is creating the power of 64 million neurons, runs on the force of a single light bulb.

While thinking about this amazing supercomputer, you should also know about the safety precautions needed when dealing with it. As with any other kind of militaristic technology, it’s important to have a backup plan if a portion of the supercomputer stops working. As the supercomputer functions at a ridiculously high level of intelligence and awareness, safety for the supercomputer is a top priority.

How Will It Be Used?

What people now should think about is how this technology will be employed. With the IBM-Air Force partnership, a military purpose is driving development. Mainly, this supercomputer will be able to help make tactical decisions while in tense and decision-laden situations.

The military is not new to advanced technology. For example, U.S. forces have quickly adopted augmented and virtual reality to help train our soldiers by visually walking troops through highly realistic mission scenarios. Cutting-edge technology and the safest backup plans can be the difference between life and death for the men and women in the armed forces.

Conclusion

The future is here. It’s taken decades, but artificial intelligence is finally on the horizon in a big way. Keep your eyes and ears open, because technology will only continue to expand and improve.

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

View Website

CONTRIBUTORS

Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Big Data Strategies Data is ubiquitous, but success apparently isn’t. Companies using big data strategies are running headlong into an 85 ...
Data as a Service

Data as a Service: 5 Strategies to Transition How You Access Data

Data as a Service Information wants to be free — at least that’s the saying. And like any good saying, ...
Top 5 Deep Learning Architectures

Top 5 Deep Learning Architectures

If you are a deep learning practitioner or someone who wants to get into the world of deep learning, you might be well ...
Data Science And Machine Learning Jobs Most In-Demand on LinkedIn

Data Science And Machine Learning Jobs Most In-Demand on LinkedIn

Data Science And Machine Learning Jobs Machine Learning Engineers, Data Scientists, and Big Data Engineers rank among the top emerging jobs ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information ...
Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of ...
Part 2 - Identity Assurance by Our Own Volition and Memory

Part 2 – Identity Assurance by Our Own Volition and Memory

Identity Assurance by Our Own Volition and Memory We believe that the reliable identity assurance (See part 1) must be ...