Insights Parallel Programming on a CPU with AVX-512

AI Thread Summary
The discussion focuses on two distinct approaches to parallel programming for solving the problem of finding the best-fitting regression line for a set of points. The first approach utilizes Single-instruction multiple-thread (SIMT) programming on Nvidia GPUs, where a single instruction is executed simultaneously across numerous microprocessors. The second approach employs Single-instruction multiple data (SIMD) on x64 processors from Intel and AMD, allowing a single instruction to operate on wide registers containing vectors. The article invites comments and questions, highlighting a surprising result that challenges common assumptions about these programming methods.
Messages
38,039
Reaction score
10,519
This article is the second of a two-part series that presents two distinctly different approaches to parallel programming. In the two articles, I use different approaches to solve the same problem: finding the best-fitting line (or regression line) for a set of points.
The two different approaches to parallel programming presented in this and the preceding Insights article (Parallel Programming on an NVIDIA GPU | Physics Forums) use these technologies.

Single-instruction multiple-thread (SIMT) programming is provided on the Nvidia® family of graphics processing units (GPUs). In SIMT programming, a single instruction is executed simultaneously on hundreds of microprocessors on a graphics card.
Single-instruction multiple data (SIMD) as provided on x64 processors from Intel® and AMD® (this article). In SIMD programming, a single instruction operates on wide registers that can contain vectors...

Continue reading...
 
Last edited:
  • Like
Likes Insulator, Jarvis323 and Greg Bernhardt
Technology news on Phys.org
That's an interesting, and surprising, result. Most people seem to have assumed the opposite. Thank you for this work!
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top