November 7, 2000


Dear [Editor],

Recent stories in the Seattle Post-Intelligencer and reprinted elsewhere regarding research and development performed through a Russian / American collaboration have mis-represented the record, maligned reputations, and misled the public.

“Spy case”, “Secrets feared stolen”, and “possible theft of secrets”, all appeared as headlines in this story.

“We had an important interest in collaborating with the Russian mathematician”, “I have seen it [the Russian technology] solve big problems”, and “The investigation couldn’t find any evidence that classified information was passed” were also in the story, but without headlines.

During the 1990’s, Elegant Mathematics, Inc. walked the talk espoused by the US State Department. Following the collapse of the Soviet Union we located and hired world class scientists in Russia to work on projects sponsored by the world’s leading technology companies. We verified that the projects we undertook were “in the national interest” of the United States. And we cooperated completely with every security inquiry and requirement made by the US government and the companies sponsoring our research.

And we got crushed.

“Suspicion”, “could have”, “might have”, and “potential loss” do not equate to “confirmed”, “did”, “tried to”, or “realized”. Following an exhaustive investigation that extended over a period of more than three years, no action was taken to penalize any of the parties involved. Why not? Is it just possible that no action was taken because nothing untoward had occurred?

Actually, something did occur and an important story has been overlooked here. Some breakthrough mathematical technologies have been buried. Opportunities to build scientific relationships have been and are being thwarted. The Cold War is not over, and it is the United States that perpetuates its conduct.

How many scientists in how many laboratories are, today, reducing the probability of advances within their research domain as they comply with actual or implicit requirements to exclude offshore colleagues from collaborations? Do we believe as a nation that we are the best and the brightest and that we will remain so without the benefit of alternative points of view?

Are not science, sport, and art human pursuits that differentiate man as a species and unite us as people? Or are they resources and capabilities to be nationalized and used to maintain and trumpet dominance?

I think the public would be well served by a forum for the thoughts and emotions of the scientific community on these questions. HPCwire is, I think, an excellent venue for such a discourse and I encourage you to invite comment on the topic.

I am enclosing here a copy of one of the published stories with my comments interposed. If you will be interested to print answers to the questions raised by the article, I will be happy to share what I know. I was there.


Russell Sarbora President Elegant Mathematics, Inc.

Seattle, WASH. — The Seattle Post-Intelligencer reports that a Russian mathematician who was given access to an American supercomputer loaded with stealth warplane design software is under investigation for espionage.

U.S. agents suspect that Aleksey Yeremin, who logged on to the supercomputer from Moscow, took advantage of Lockheed Martin and military security lapses to steal stealth technology secrets.

The 31/2-year investigation stretches from the heart of the old Soviet empire to Lockheed’s secretive Skunk Works plant in Southern California to a quiet suburb north of Seattle.

Yes, agents suspect. That is their job. They also investigated for 3.5 years, and found no evidence. There was nothing to find.

Yeremin, vice president of a software company based in Bothell, Wash. That did work for Lockheed, was e-mailed part of Lockheed’s modeling program for designing stealth planes. And, sources say, it would have been easy for him to steal the rest of it.

The program parts we were mailed dealt with specifics regarding how to interface the software modules being developed by Elegant into Lockheed’s program. Our work was being performed in conjunction with a contract from Lockheed. It was information we needed to perform the job we had been hired to do. The computer expert at Lockheed agreed that this information was within the scope of that needed to carry out our assignment, he cleared the release of that information with his security apparatus, and our use of that information was restricted to our conduct of our contractual obligation to Lockheed.

The potential loss is staggering: America’s global monopoly on radar invisibility.

In the spring of 1997, the FBI and the Air Force Office of Special Investigations, or OSI, launched the investigation. A short time later, Lockheed pulled the plug on its project with Yeremin. Federal criminal-justice sources say Yeremin, 46, has connections to the Russian military and now-defunct KGB.

Yeremin’s connections to the Russian military and now-defunct KGB pre-date his employment by Elegant Mathematics, Inc. All Russian scientists having any modicum of advanced skills can be said to have similar connections.

It is unknown whether Yeremin got his hands on any classified information. But sources say that some of the unclassified information he did obtain should have been classified top-secret.

As a part of Elegant’s standard software license agreement we require that all information provided to Elegant be free of any export controls. Lockheed replaced our license agreement with one of their own standard format agreements, which bore the same restrictions. We did not request and did not receive any classified information. If information we received was classified after the fact, we are unaware and have NOT been advised to destroy, return, or otherwise restrict our use of that data. We’re not sure what data are being referenced by these “sources”.

A retired Air Force three-star general said he is concerned that the apparent leak could help the Russians build their own stealth warplanes. “I don’t think what is at risk here is making these [U.S.] aircraft any more visible to radar,” said George Muellner, who played a key role in developing the nation’s stealth fleet. “But what is at risk is accelerating a country’s ability to develop and build these sorts of aircraft – to produce something that is a threat downstream,” he said. “If they started building and selling these things to the Iraqis, that would be a concern.”

Give me a break. These guys are trying to build basic necessities. I don’t think that the export of a new generation of munitions is on their radar screen.

The joint FBI-Air Force probe has so far yielded no arrests, and no one has been publicly charged with a crime.

The Air Force Office of Special Investigations has stated for the record that no laws were broken. Thus no one has been charged with a crime.

Federal prosecutors, the FBI and the Air Force OSI refused to comment on the case. “What I can tell you is it is an ongoing investigation,” said Maj. Mike Richmond, an OSI spokesman at Andrews Air Force Base in Maryland.

Working out of his Bothell home, high-tech entrepreneur Russ Sarbora plucked Yeremin from a Russian military aircraft-design center a decade ago and collaborated with him to start a company called Elegant Mathematics.

Today, Sarbora is shocked that his business partner is under investigation in an espionage case. “I believe he is not an agent for any foreign power,” Sarbora said. “It would surprise me enormously if he turned out to be.”

Yeremin “readily acknowledged working for the Soviet military,” according to Sarbora, but “prior to 1990, if you were a scientist of any stature, you worked for the Soviet military structure. You didn’t get to work, or support in school without working for the military.”

Yeremin and his associates in Russia were working on computers loaded with software known as MM3D, or Method of Moments in Three Dimensions. It would have been easy for people with their expertise to steal the portions of MM3D they hadn’t already been given, the former Lockheed computer expert said.

Lockheed has the code provided by Elegant. If there are concerns that it may have had some mechanism for copying information and transmitting it outside of the authorized domain, please execute and analyze the code.

We were offering a source code license to Lockheed. We’re clever mathematicians, but it would surprise me greatly if we turned out to be clever enough to build such a capability into this program and to succeed in concealing that capability in source code.

And it wasn’t just MM3D that was at risk of being stolen. Also loaded on the expert’s home computer were test fixtures – secret computer representations of stealth aircraft structures. The expert said he had been assured by Lockheed engineers that the test fixtures were not classified. But after the investigation began, federal agents claimed some were top-secret. One of the computers Yeremin was given access to also contained data on the performance characteristics of radar-absorbing materials that coat stealth planes, the expert said. Those data, however, did not specifically identify the name or chemical composition of the materials, he said.

The presence of this data on the Lockheed computer expert’s home computer is irrelevant. We do not know where he lived, never had any access to his home computer, and never knew that it contained any classified data.

The high performance computer we shared was operated by the computer hardware vendor as a platform for demonstration of their computer systems’ capability. We verified that it had the strongest possible security walls established between users before we agreed to put our technology on the system.

Did the investigators check to see if any attempts to breach the security mechanisms on those systems took place during the periods we used those systems? We are not aware of security breaches or breach attempts during our use of the system(s).

Elegant’s access to all of these computer systems have terminated naturally in conjunction with the conclusion of sponsorship of our work by these hardware vendors. I expect that, had the vendor any security related concerns regarding Elegant’s use of their system, our access would have been terminated.

The concerns that we could have stolen data are founded in speculation. The record is that no attempts to steal data occurred.

Gen. Muellner, now vice president-general manager of The Boeing Co.’s Phantom Works research and development division, cautions that there may be no way of telling if the apparent leak is devastating or merely distressing.

Like Lee and former CIA Director John Deutch, who is under investigation for having classified information on his home computer, the Lockheed computer expert was working on an unsecure computer. His home computer was loaded with MM3D. The program, he said, contains a feature called an “optimizer” by which designers can simulate changes in aircraft configuration or materials and quickly see how that affects the plane’s radar invisibility.

Unlike in the Deutch case, the computer expert said he had written permission from Lockheed’s security and legal departments to work on the program at home. Only after the investigation began was he told that the optimizer should have been classified top-secret, he said.

The computer expert said the reason he was allowed to work at home is that at night, he could access government and private supercomputers for free, saving Lockheed the expense of maintaining an in-house supercomputer on which he could work. “I really campaigned hard to get an in-house supercomputer so I wouldn’t have to go out on the Net,” he said.

He said he repeatedly sought guidance from Lockheed security officials over how far he could go with Yeremin but was either ignored or rebuffed. “I had continually apprised security of everything,” he said. “Somebody out there knew what Alex’s background was. But somehow the communication to the (security) guy that was supposed to be covering my back didn’t happen.”

A former Lockheed security official agreed. “It was bungled by Lockheed and the Air Force. From what I saw, everybody kind of snoozed through, kind of kissed it off. It was just ‘keep an eye on it and give a report once in a while,'” said the former official, who spoke on condition of anonymity.

The computer expert said he left Lockheed after the company pulled his access to work on the stealth program. He remained a Lockheed consultant for a time, then left for another job. He maintains that any information he gave Yeremin “pales in comparison” to open articles written by scientists and engineers, and technical information available over the Internet. “The bigger issue is that these guys (Russian mathematicians) had access to a lot of computers and computer networks,” the former employee said. “Their software was being run on many American networks and supercomputers.”

And there has never been any report of a security breach on any of those systems in conjunction with our use of those systems.

The 48-year-old Sarbora is a longtime software programmer and former computer industry executive. He moved to Seattle in 1988 to become vice president of quality assurance and technical support at Microrim Inc., a database software company.

During the Goodwill Games of 1990, Sarbora volunteered to work on a project showcasing the best of Soviet technology and met several Russian scientists. The following year, Sarbora went to Russia on a business trip, looking to bring back software he could sell to U.S. companies. He said he met Yeremin at the Central Aerohydrodynamics Institute, about 30 miles southeast of Moscow, where Russian warplanes are designed.

It was shortly after the fall of the Soviet Union. Work for scientists and mathematicians in Russia was rapidly disappearing. The U.S. government feared they would peddle their expertise in “rogue” states like Libya or Iraq.

When Sarbora learned that Yeremin had created an algorithm, or calculation method, that could achieve on relatively primitive computers what U.S. scientists did on supercomputers, he immediately grasped the scientific and commercial potential.

Yeremin joined forces with Sarbora to launch Elegant Mathematics. They incorporated in Washington state with Sarbora as president and Yeremin as vice president. The main offices, however, were thousands of miles away in Moscow, at the Russian Academy of Sciences.

At its peak, the company employed about 20 mathematicians, physicists and software experts from the Russian academy, Steklov Mathematical Institute and Moscow State University.

“We insisted on maintaining the team in Russia,” Sarbora said. “The idea is that after the transition from communism to capitalism, there would be a few teams that could maintain mathematics in Russia.”

“We developed technology that would reduce computational costs of solving problems in stealth technology by reducing the number of calculations by an order of 10,” Sarbora said.

Sarbora said his company scored its first major contract with Cray, a supercomputer maker, and continued working on its software-development project at the Pittsburgh Supercomputing Center and at IBM.

In 1994, Elegant Mathematics was hired by Lockheed to improve the efficiency and speed of computer simulations related to the interaction between the aircraft and radar. That effectively meant infusing MM3D with Yeremin’s “solver” program.

The computer expert’s job at Lockheed involved using computers to simulate how a radar wave reflects off the surface of a plane. The whole idea of stealth technology is to prevent that reflection so the wave echo doesn’t return to the radar antenna and get read on a radar screen.

Over the next three years, the computer expert said, he met with Yeremin at Skunk Works at least 15 times. The sprawling facility in the Mojave Desert is surrounded by chain-link fences topped with razor wire. Armed guards are stationed at the gates. Access to secure buildings requires personal security codes and badges that open electronic locks.

The former Lockheed security official said the company lusted after Elegant Mathematics’ promised cost-cutting technology. “That was where the greed came in. Yeremin was offering this tantalizing carrot in front of everybody.”

“He’s an interesting character,” the computer expert said of Yeremin. “I always liked him a lot because of his zeal for the task at hand. But he leaves a trail of people very pissed off because he’s so arrogant. He’s brilliant, but not as brilliant as he thinks he is.”

The expert, however, said he believed in Yeremin’s algorithm. “I have seen it solve big problems,” he said. “Seeing is believing. I don’t think they were peddling snake oil.”

Others disagree. Even before the security concerns were raised, Yeremin’s breakthrough was being officially snubbed. Elegant Mathematics’ grant application to continue research into its algorithm failed to pass review at the Defense Advanced Research Projects Agency, a Defense Department agency that sponsors exotic research.

“The methods he (Yeremin) has developed are not considered competitive in this country. He got attention for a while, until his balloon was punctured,” said University of Illinois professor Eric Michielssen, an expert in the use of computer modeling of radar problems.

Three (3) competing aerospace companies in the United States, and one in Europe, validated that the Elegant software produced correct results at the reduced computational cost claimed by Elegant. We consider those results competitive.

The computer expert said he sent Yeremin sections of source code, the underlying components of the MM3D program, by e-mail in early 1997. He said the source code was not classified, and the portions he sent were not related to the physics of stealth, but to technical requirements of inputting and retrieving data that Yeremin needed for his work.

The expert was testing Yeremin’s software on supercomputers at the NASA Ames Research Center in California, the Oak Ridge National Laboratory in Tennessee and at IBM in New York. The entire MM3D program was loaded on the NASA Ames and IBM computers, as well as on his home computer, he said.

Federal agents told the expert there were worries over whether Yeremin’s software might have been implanted with the hacking capability of e-mailing information from those computers back to Russia. And Yeremin had direct, online access to the IBM supercomputer, the expert said. The expert said the agents “were never 100 percent sure that I had not sent the whole (MM3D) source code to Yeremin. I could have sent the whole farm to him. Which, of course, I did not.”

There was also the concern that Yeremin or one of his Russian colleagues could have hacked into the computer expert’s home computer. The expert said he followed the rules by reporting his e-mail exchanges with Yeremin to Lockheed security. Security people later turned over to Air Force OSI agents information on the e-mails, triggering the investigation.

What the Air Force calls a “Red Team” – a group of technology, military and security experts – was mobilized to assess the potential damage to national security. One inside source said the team called it “catastrophic.” Other investigators are not convinced that Yeremin was involved in espionage, federal sources said.

Like Muellner, the retired general, the former Lockheed computer expert worries that the Russians might have stolen technology that gives them a big boost in the design and construction of stealth aircraft.

“We don’t know if he got the source codes,” the computer expert said. “That was the supposition due to the fact that we were working on the same computer. A routine hacker with the kind of access Yeremin had could have gotten the codes.”

I repeat, we are mathematicians, not hackers. Access to those computer systems was our heart. We would have lost our access if security concerns of hacking were raised in connection with our use of those systems. No such concerns were raised, and to our knowledge none of those systems were the target of any hacking group during the time we used those systems.

When federal agents came calling on the computer expert on June 23, 1997, he was aghast. They entered his home in California’s Tehachapi Mountains and demanded that he turn over his computer. He said he cooperated fully. They told him he may have seriously damaged national security. “I was traumatized beyond belief,” he said. That was more than three years ago.

The agents still have his hard drive. He hasn’t been arrested since then, he asserts, because he didn’t deliver classified information to Yeremin, had permission to work on his home computer and had no intent to damage national security.

The FBI paid a similar call on Sarbora in 1997. Sarbora says it marked the beginning of the end for Elegant Mathematics.

Lockheed soon cut its ties to the company. The specter of an espionage investigation scared off almost everyone else.

The FBI, Sarbora said, interviewed “our customers and prospective customers; anyone we had a relationship with. That had a very chilling effect on business. It pretty much put a box around it and shut it down.”

In 1997 and 1998, Sarbora was questioned several times by the FBI. So was Yeremin, who has not been seen in the United States since 1999. While Yeremin is still considered a “person of interest” in the spy case, Sarbora said the agents ultimately told him he was no longer under suspicion.

Professor Yeremin has traveled to the United States on a regular basis over the past 10 years in conjunction with our business here. Our business was closed down by this investigation. If someone want to see him here, hire him.

By then, it was too late. The dreams of Yeremin and Sarbora had been dashed. So were the hopes of the crack team of Russian scientists. They “are all scratching for jobs,” Sarbora said. “Elegant was on life-support – comatose – and remains so.”


Subscribe to HPCwire's Weekly Update!

Be the most informed person in the room! Stay ahead of the tech trends with industy updates delivered to you every week!

China’s Tencent Server Design Will Use AMD Rome

November 13, 2019

Tencent, the Chinese cloud giant, said it would use AMD’s newest Epyc processor in its internally-designed server. The design win adds further momentum to AMD’s bid to erode rival Intel Corp.’s dominance of the glo Read more…

By George Leopold

NCSA Industry Conference Recap – Part 1

November 13, 2019

Industry Program Director Brendan McGinty welcomed guests to the annual National Center for Supercomputing Applications (NCSA) Industry Conference, October 8-10, on the University of Illinois campus in Urbana (UIUC). On Read more…

By Elizabeth Leake, STEM-Trek

Cray, Fujitsu Both Bringing Fujitsu A64FX-based Supercomputers to Market in 2020

November 12, 2019

The number of top-tier HPC systems makers has shrunk due to a steady march of M&A activity, but there is increased diversity and choice of processing components with Intel Xeon, AMD Epyc, IBM Power, and Arm server ch Read more…

By Tiffany Trader

Intel AI Summit: New ‘Keem Bay’ Edge VPU, AI Product Roadmap

November 12, 2019

At its AI Summit today in San Francisco, Intel touted a raft of AI training and inference hardware for deployments ranging from cloud to edge and designed to support organizations at various points of their AI journeys. Read more…

By Doug Black

SIA Recognizes Robert Dennard with 2019 Noyce Award

November 12, 2019

If you don’t know what Dennard Scaling is, the chances are strong you don’t labor in electronics. Robert Dennard, longtime IBM researcher, inventor of the DRAM and the fellow for whom Dennard Scaling was named, is th Read more…

By John Russell

AWS Solution Channel

Making High Performance Computing Affordable and Accessible for Small and Medium Businesses with HPC on AWS

High performance computing (HPC) brings a powerful set of tools to a broad range of industries, helping to drive innovation and boost revenue in finance, genomics, oil and gas extraction, and other fields. Read more…

IBM Accelerated Insights

Leveraging Exaflops Performance to Remediate Nuclear Waste

November 12, 2019

Nuclear waste storage sites are a subject of intense controversy and debate; nobody wants the radioactive remnants in their backyard. Now, a collaboration between Berkeley Lab, Pacific Northwest National University (PNNL Read more…

By Oliver Peckham

Cray, Fujitsu Both Bringing Fujitsu A64FX-based Supercomputers to Market in 2020

November 12, 2019

The number of top-tier HPC systems makers has shrunk due to a steady march of M&A activity, but there is increased diversity and choice of processing compon Read more…

By Tiffany Trader

IBM Adds Support for Ion Trap Quantum Technology to Qiskit

November 11, 2019

After years of percolating in the shadow of quantum computing research based on superconducting semiconductors – think IBM, Rigetti, Google, and D-Wave (quant Read more…

By John Russell

Tackling HPC’s Memory and I/O Bottlenecks with On-Node, Non-Volatile RAM

November 8, 2019

On-node, non-volatile memory (NVRAM) is a game-changing technology that can remove many I/O and memory bottlenecks and provide a key enabler for exascale. Th Read more…

By Jan Rowell

MLPerf Releases First Inference Benchmark Results; Nvidia Touts its Showing

November 6, 2019

MLPerf.org, the young AI-benchmarking consortium, today issued the first round of results for its inference test suite. Among organizations with submissions wer Read more…

By John Russell

Azure Cloud First with AMD Epyc Rome Processors

November 6, 2019

At Ignite 2019 this week, Microsoft's Azure cloud team and AMD announced an expansion of their partnership that began in 2017 when Azure debuted Epyc-backed ins Read more…

By Tiffany Trader

Nvidia Launches Credit Card-Sized 21 TOPS Jetson System for Edge Devices

November 6, 2019

Nvidia has launched a new addition to its Jetson product line: a credit card-sized (70x45mm) form factor delivering up to 21 trillion operations/second (TOPS) o Read more…

By Doug Black

In Memoriam: Steve Tuecke, Globus Co-founder

November 4, 2019

HPCwire is deeply saddened to report that Steve Tuecke, longtime scientist at Argonne National Lab and University of Chicago, has passed away at age 52. Tuecke Read more…

By Tiffany Trader

Spending Spree: Hyperscalers Bought $57B of IT in 2018, $10B+ by Google – But Is Cloud on Horizon?

October 31, 2019

Hyperscalers are the masters of the IT universe, gravitational centers of increasing pull in the emerging age of data-driven compute and AI.  In the high-stake Read more…

By Doug Black

Supercomputer-Powered AI Tackles a Key Fusion Energy Challenge

August 7, 2019

Fusion energy is the Holy Grail of the energy world: low-radioactivity, low-waste, zero-carbon, high-output nuclear power that can run on hydrogen or lithium. T Read more…

By Oliver Peckham

Using AI to Solve One of the Most Prevailing Problems in CFD

October 17, 2019

How can artificial intelligence (AI) and high-performance computing (HPC) solve mesh generation, one of the most commonly referenced problems in computational engineering? A new study has set out to answer this question and create an industry-first AI-mesh application... Read more…

By James Sharpe

Cray Wins NNSA-Livermore ‘El Capitan’ Exascale Contract

August 13, 2019

Cray has won the bid to build the first exascale supercomputer for the National Nuclear Security Administration (NNSA) and Lawrence Livermore National Laborator Read more…

By Tiffany Trader

DARPA Looks to Propel Parallelism

September 4, 2019

As Moore’s law runs out of steam, new programming approaches are being pursued with the goal of greater hardware performance with less coding. The Defense Advanced Projects Research Agency is launching a new programming effort aimed at leveraging the benefits of massive distributed parallelism with less sweat. Read more…

By George Leopold

AMD Launches Epyc Rome, First 7nm CPU

August 8, 2019

From a gala event at the Palace of Fine Arts in San Francisco yesterday (Aug. 7), AMD launched its second-generation Epyc Rome x86 chips, based on its 7nm proce Read more…

By Tiffany Trader

D-Wave’s Path to 5000 Qubits; Google’s Quantum Supremacy Claim

September 24, 2019

On the heels of IBM’s quantum news last week come two more quantum items. D-Wave Systems today announced the name of its forthcoming 5000-qubit system, Advantage (yes the name choice isn’t serendipity), at its user conference being held this week in Newport, RI. Read more…

By John Russell

Ayar Labs to Demo Photonics Chiplet in FPGA Package at Hot Chips

August 19, 2019

Silicon startup Ayar Labs continues to gain momentum with its DARPA-backed optical chiplet technology that puts advanced electronics and optics on the same chip Read more…

By Tiffany Trader

Crystal Ball Gazing: IBM’s Vision for the Future of Computing

October 14, 2019

Dario Gil, IBM’s relatively new director of research, painted a intriguing portrait of the future of computing along with a rough idea of how IBM thinks we’ Read more…

By John Russell

Leading Solution Providers

ISC 2019 Virtual Booth Video Tour


Intel Confirms Retreat on Omni-Path

August 1, 2019

Intel Corp.’s plans to make a big splash in the network fabric market for linking HPC and other workloads has apparently belly-flopped. The chipmaker confirmed to us the outlines of an earlier report by the website CRN that it has jettisoned plans for a second-generation version of its Omni-Path interconnect... Read more…

By Staff report

Kubernetes, Containers and HPC

September 19, 2019

Software containers and Kubernetes are important tools for building, deploying, running and managing modern enterprise applications at scale and delivering enterprise software faster and more reliably to the end user — while using resources more efficiently and reducing costs. Read more…

By Daniel Gruber, Burak Yenier and Wolfgang Gentzsch, UberCloud

Dell Ramps Up HPC Testing of AMD Rome Processors

October 21, 2019

Dell Technologies is wading deeper into the AMD-based systems market with a growing evaluation program for the latest Epyc (Rome) microprocessors from AMD. In a Read more…

By John Russell

Rise of NIH’s Biowulf Mirrors the Rise of Computational Biology

July 29, 2019

The story of NIH’s supercomputer Biowulf is fascinating, important, and in many ways representative of the transformation of life sciences and biomedical res Read more…

By John Russell

Intel Debuts Pohoiki Beach, Its 8M Neuron Neuromorphic Development System

July 17, 2019

Neuromorphic computing has received less fanfare of late than quantum computing whose mystery has captured public attention and which seems to have generated mo Read more…

By John Russell

Xilinx vs. Intel: FPGA Market Leaders Launch Server Accelerator Cards

August 6, 2019

The two FPGA market leaders, Intel and Xilinx, both announced new accelerator cards this week designed to handle specialized, compute-intensive workloads and un Read more…

By Doug Black

When Dense Matrix Representations Beat Sparse

September 9, 2019

In our world filled with unintended consequences, it turns out that saving memory space to help deal with GPU limitations, knowing it introduces performance pen Read more…

By James Reinders

With the Help of HPC, Astronomers Prepare to Deflect a Real Asteroid

September 26, 2019

For years, NASA has been running simulations of asteroid impacts to understand the risks (and likelihoods) of asteroids colliding with Earth. Now, NASA and the European Space Agency (ESA) are preparing for the next, crucial step in planetary defense against asteroid impacts: physically deflecting a real asteroid. Read more…

By Oliver Peckham

  • arrow
  • Click Here for More Headlines
  • arrow
Do NOT follow this link or you will be banned from the site!
Share This