Monday, November 28, 2005

Breathing Life Into Older Computers

"ASE Labs has written an article on using a light distribution of Linux, Damn Small Linux, to power an older computer. With Linux, older computers can be useful once again for many people. From the article: "The oldest computer I have is a Pentium 266 MMX laptop with 64MB of RAM. Most people would just consider this to be garbage and junk it, and if you brought this in for service where I work, I would agree with you. While this laptop might seem old and out-of-date now, it is small and light. I needed something I could easily carry around, so I figured I would see what I could salvage out of this dinosaur. Windows would have a hard time running on this low-spec laptop, but there are many distributions of Linux that will work exceptionally well.""

source:http://linux.slashdot.org/linux/05/11/28/158233.shtml?tid=164&tid=106&tid=218

Run Windows MCE Applications on Xbox 360

"A user of the GA-forum found out the Media Extender on the Xbox 360 allows to stream Windows MediaCenter applications over network on your Xbox 360 console. While the applications themselves will run on the MCE PC, it'll stream the interface/input to the Xbox360/PC. Simple MCE apps like those modified browsers to pull down news stories, stock quotes, sports scores etc., as well as several internet radio clients worked fine. Mini-games like a Tetris clone and some card game crashed, but then again ... that seems to be a normal behaviour for the 360."

source:http://games.slashdot.org/games/05/11/28/1413228.shtml?tid=211&tid=1

Goto Leads to Faster Code

"There's an article over at the NY Times (registration required) about Kazushige Goto, the author of the Goto Basic Linear Algebra Subroutines (BLAS, see the wiki); his BLAS implementation is used by 4 of the current 11 fastest computers in the world. Goto is known for painstaking effort in hand-optimizing his routines; in one case, "when computer scientists at the University at Buffalo added Goto BLAS to their Pentium-based supercomputer, the calculating power of the system jumped from 1.5 trillion to 2 trillion mathematical operations per second out of a theoretical limit of 3 trillion." To quote Jack Dongarra, from the University of Tennessee, "I tell them that if they want the fastest they should still turn to Mr. Goto."" Ever get the feeling someone wrote an article merely for the pun?

source:http://developers.slashdot.org/developers/05/11/28/1257216.shtml?tid=156&tid=218

Is SETI a Security Risk?

"Richard Carrigan, a particle physicist at the US Fermi National Accelerator Laboratory in Illinois, fears the Search for Extra-Terrestrial Intelligence (SETI) may be putting the earth at risk. As reported in the Guardian, Carrigan frets that alien radio signals could pose a security risk. The report cites a 2003 paper entitled "Do potential Seti signals need to be decontaminated?" but Carrigan's website has more details. Basically, he's calling for isolation of SETI computers and additional security measures. He writes, "To paraphrase Cocconi and Morrison for the possibility of a malevolent SETI signal ...the probability of a contaminated SETI signal is difficult to estimate; but if we never consider it the chance of infection is not zero."" Frankly, I'm more worried about some phishing malcontent then I am about the Grays, but maybe that's just me.

source:http://science.slashdot.org/science/05/11/28/1254249.shtml?tid=160&tid=172&tid=1

Free60 Project Aims for Linux on Xbox 360

"The Free60 Project wiki and developers mailinglist has been launched. The project aims to port open source operating systems like GNU/Linux and Darwin to the Microsoft Xbox 360 gaming console. The site already contains some interesting details about the Xbox 360 security: per-box key stored on CPU, boot ROM will be on CPU too and a hypervisor verifies the running state of the kernel."

source:http://games.slashdot.org/article.pl?sid=05/11/27/166248&tid=211&tid=106

Fix Your Crashing X-Box 360 With String

"A gamer fed up with his new Xbox 360 crashing every 20 minutes has fixed the problem by raising the power supply off the ground with some string. Goldeneyemaster over at the GameSpot forums indicates that the main reason for his Xbox 360 freezing up is the power supply overheating. The solution is to lift the power supply off the floor and allow the air to circulate better around it."

source:http://games.slashdot.org/article.pl?sid=05/11/27/158237&tid=211&tid=1

Anti-cancer Compound In Beer Gaining Interest

A compound found only in hops and the main product they are used in - beer - has rapidly gained interest as a micronutrient that might help prevent many types of cancer.

Researchers at Oregon State University first discovered the cancer-related properties of this flavonoid compound called xanthohumol about 10 years ago. A recent publication by an OSU researcher in the journal Phytochemistry outlines the range of findings made since then. And many other scientists in programs around the world are also beginning to look at the value of these hops flavonoids for everything from preventing prostate or colon cancer to hormone replacement therapy for women.

"Xanthohumol is one of the more significant compounds for cancer chemoprevention that we have studied," said Fred Stevens, a researcher with OSU's Linus Pauling Institute and an assistant professor of medicinal chemistry in the College of Pharmacy. "The published literature and research on its properties are just exploding at this point, and there's a great deal of interest."

Quite a bit is now known about the biological mechanism of action of this compound and the ways it may help prevent cancer or have other metabolic value. But even before most of those studies have been completed, efforts are under way to isolate and market it as a food supplement. A "health beer" with enhanced levels of the compound is already being developed.

"We can't say that drinking beer will help prevent cancer," Stevens said. "Most beer has low levels of this compound, and its absorption in the body is also limited. But if ways can be developed to significantly increase the levels of xanthohumol or use it as a nutritional supplement - that might be different. It clearly has some interesting cancer chemopreventive properties, and the only way people are getting any of it right now is through beer consumption."

Xanthohumol was actually first discovered in 1913, isolated as a yellow substance found in hops. Researchers started studying its molecular structure in the 1950s, but for decades the only people who showed any real interest in it were brewers, who were trying to learn more about how hops help impart flavor to beer.

In the 1990s, researchers at OSU, including Stevens and toxicologist Don Buhler, began to look at the compound from another perspective - its anti-cancer properties. It showed toxicity to human breast, colon and ovarian cancer cells, and most recently has shown some activity against prostate cancer in OSU studies.

Xanthohumol appears to have several mechanisms of action that relate to its cancer preventive properties, scientists say. It, and other related flavonoid compounds found in hops, inhibit a family of enzymes, commonly called cytochromes P450 that can activate the cancer process. It also induces activity in a "quinone reductase" process that helps the body detoxify carcinogens. And it inhibits tumor growth at an early stage.

In recent years, it has also been shown that some prenylflavonoids found in hops are potent phytoestrogens, and could ultimately have value in prevention or treatment of post-menopausal "hot flashes" and osteoporosis - but no proper clinical trials have been done to study this.

Information about these compounds appears to be spreading. Hop-containing herbal preparations are already being marketed for breast enlargement in women, the OSU research report said, without waiting for tests to verify their safety or efficacy. And a supposed "health" beer is being developed in Germany with higher levels of xanthohumol.

It's possible, scientists say, that hops might be produced or genetically engineered to have higher levels of xanthohumol, specifically to take advantage of its anti-cancer properties. Some beers already have higher levels of these compounds than others. The lager and pilsner beers commonly sold in domestic U.S. brews have fairly low levels of these compounds, but some porter, stout and ale brews have much higher levels.

Ideally, researchers say, cancer chemoprevention is targeted at the early stages of cancer development and prevented by long-term exposure to non-toxic nutrients, food supplements or drugs that prevent the formation of cancers. With its broad spectrum activity, presence in food products, and ability to inhibit cancer at low concentrations, xanthohumol might be a good candidate for that list, experts say.

Xanthohumol also appears to have a role as a fairly powerful antioxidant - even more than vitamin E. And it has shown the ability to reduce the oxidation of LDL, or bad cholesterol.

source:http://www.biologynews.net/archives/2005/11/26/anticancer_compound_in_beer_gaining_interest.html


By Silencing Gene in Worm, Researchers Identify Role in Age-Old Mystery of Regeneration

Press Images



Specimens of the clonal strain CIW4 of the planarian
Schmidtea mediterranea. These animals are excellent tissue
regenerators and share with humans bilateral symmetry and tissues
derived from all three germ layers, i.e., ectoderm, mesoderm and
endoderm.

To download high-resolution click here:

Credit: A. Sánchez Alvarado




A fixed specimen of Schmidtea mediterranea processed to detect expression of Smedwi. Anterior is to the left and displays the dark, prominent, and characteristic photoreceptors found in planarians. The remainder pigmentation indicates those cells in which Smedwi transcription is occurring. The pattern of expression matches the known distribution of proliferating stem cells in this organism. The stem cells are known as neoblasts, a term first used by Harriet Randolph in 1892 to describe the
undifferentiated cells found in the adult bodies of various worms.

To download high-resolution click here:

Credit: P.W. Reddien and A. Sánchez Alvarado

Nov. 24, 2005 – Researchers at the University of Utah have discovered that when a gene called smedwi-2 is silenced in the adult stem cells of planarians, the quarter-inch long worm is unable to carry out a biological process that has mystified scientists for centuries: regeneration.

The study published in the Nov. 25 issue of Science was led by Alejandro Sánchez Alvarado, Ph.D., Howard Hughes Medical Institute investigator and professor of neurobiology and anatomy at the U of U School of Medicine, and carried out by members of his laboratory, in particular Helen Hay Whitney Foundation post-doctoral fellow Peter W. Reddien who is now an Associate Member at the Whitehead Institute for Biomedical Research.

Elimination of smedwi-2 not only leads to an inability to mount a regenerative response after amputation, but also to the eventual demise of unamputated animals along a reproducible series of events, that is, regression of the head tip, curling of the body and tissue disintegration. These defects are very similar to what is observed after the planarian stem cells are destroyed by lethal doses of irradiation. The key difference, however, is that the irradiation-like defects observed in animals devoid of smedwi-2 occur even though the stem cells are still present in the organism.

This finding suggests something surprising: the instructions that a daughter stem cell needs to differentiate for regeneration or for maintaining tissue structure begin to be defined at the time of division of its parent cell. “Once the smedwi-2 molecule is eliminated, the animal is destined to die since the functions of the daughter cells are severely compromised” said Sánchez Alvarado. The study follows a landmark work that he and Reddien published last spring in Developmental Cell, in which, using a method of gene silencing called RNA interference (RNAi), the researchers silenced more than 1,000 planarian genes, some of which they identified as essential for regeneration. The Science study focus on one such gene, smedwi-2, and brings a new level of genetic detail to understanding planarian regeneration.

Planarians long have fascinated biologists with their ability to regenerate. A worm sliced in two forms two new worm s; even a fractional part of a planarian will grow into a new worm. Scientists know that planarian stem cells, called neoblasts, are central to regeneration, but their exact role is only now being learned.

When an animal stem cell divides, two daughter cells are formed: one that is another stem cell and a second one that can differentiate into the cells that form bone, tissue, and other parts of an organism. These second types of cells are essential for regeneration or maintaining the form and function of tissues by replacing cells that die, a process called homeostasis. By eliminating smedwi-2, the researchers uncovered a role of this protein in regulating the normal differentiation and function of daughter cells.

The researchers postulated three theories why the worms could not regenerate or maintain cells after smedwi-2 was silenced:

The team found that the stem cells were competent to robustly respond to amputation by significantly increasing their proliferation as well as to home to tissues undergoing homeostasis. But the researchers also found that once the daughter cells reach their target tissues, they were unable to properly differentiate.

“The smedwi-2 molecule is doing something early in the specification of stem cell progeny that modulates their ability to differentiate into the proper cell type,” Sánchez Alvarado said.

How this molecule is modulating stem cells is one of the next steps that he and Reddien are trying to solve. The answer could have far-reaching implications, because genes similar to smedwi-2 are found in plants, animals and human beings.

source:http://www.utah.edu/unews/releases/05/nov/regeneration.html


Googling For Gold

With a market cap in orbit and more cash than a small nation, Google's heft is altering the tech industry's behavior. But when does its long-awaited shopping spree begin?

With the news that shares of online search giant Google Inc. () had crossed the lofty $400-per-share mark on Nov. 17, the world may have witnessed something akin to the birth of a new financial planetary system. Given its market cap of $120 billion, double that of its nearest competitor, Yahoo!, Google now has the gravitational pull to draw in a host of institutions and company matchmakers unable to resist the potential profit opportunities. Google stock, with a price-earnings ratio of 70, represents one of the richest dealmaking currencies anywhere. That heft has attracted a growing galaxy of entrepreneurs, venture capitalists, and investment bankers, all of whom are orbiting Google in the hopes of selling it something -- a new service, a startup company, even a new strategy -- anything to get their hands on a little of the Google gold. "The dollars at stake are huge," says Geoffrey Baldwin, managing director at San Francisco investment bank Perseus Group.

The Google effect is already changing the delicate balance in Silicon Valley between venture capitalists and startup companies. Instead of nurturing the most promising startups with an eye toward taking the fledgling businesses public, a growing number of VCs now scour the landscape for anyone with a technology or service that might fill a gap in Google's portfolio. Google itself and not the larger market has become the exit strategy as VCs plan for the day they can take their money out of their startups. Business founders have felt the tug as well. "You're hearing about a lot of entrepreneurs pitching VCs with their end goal to be acquired by Google," says Daniel Primack, editor of PE Week Wire, a dealmaking digest popular in VC circles. "It's a complete 180 [degree turn] from the IPO craze of five years ago; now Google is looked at like NASDAQ was then." Other entrepreneurs, meanwhile, are skipping the VC stage altogether, hoping to sell directly to Google.

On Wall Street, the Google effect, while less profound, is still clearly in force. All manner of investment banks, from giants such as Morgan Stanley () and Credit Suisse First Boston () to mid-size players such as Allen & Co., have dispatched bankers to Google's Mountain View (Calif.) headquarters, the better to court the Google gatekeepers as they attempt to sell a raft of mergers and acquisitions, financings, and strategic advice. Meanwhile, smaller boutique firms are trying to ride Google's considerable coattails, signing up the scores of increasingly valuable Web upstarts cropping up around Google.

There's one snag in this planetary realignment: Google has shown little interest so far in doing big deals with anyone. Although it briefly sniffed around Web-phone giant Skype Technologies, Google blanched at the eventual price of $2.6 billion ponied up by eBay Inc. () in September. In fact, Google's biggest deal to date is the $102 million it paid for online ad upstart Applied Semantics Inc. in 2003. For now, at least, Google is passing on big, bold deals. "They are flooded with people trying to get in the door," says Rodd Langenhagen, managing director of Boston mergers and acquisitions shop Revolution Partners. "But so far Google is just a great potential acquirer." Adds tech banker Alec Ellison of New York-based Jefferies Broadview: "M&A is just not a very high priority for them."

But if dot-com history is any indication, the risks of doing nothing could be substantial. Google could be sitting on an ephemeral asset. In 1999, Yahoo Inc. (), Google's closest publicly traded equivalent, had a $115 billion market cap but passed up the chance to buy eBay. Today, eBay is worth more than Yahoo, whose value has since nearly halved. At its 1999 height, Doubleclick, the big online ad player of yesteryear, had $14 billion in market cap. It didn't put it to work, though, and in April this year was bought by a private equity firm for just over $1 billion.

That's not to say Google could afford to go out and do a big deal just for the sake of it. A mega-takeover potentially could wreak havoc on Google. Even Piper Jaffray Co's. () 11/18/05 @ 9:05 PM --] Internet analyst Safa Rashtchy, one of Wall Street's biggest Google bulls, says: "If they were to buy AOL or eBay, it would hurt the stock." Says David C. Drummond, Google's head of corporate development: "We're not going to manufacture opportunities solely because of the currency." (Although Google prefers not to comment on its dealmaking plans, it did make Drummond, as well as its investment bankers, available for some questions.)

All the same, the lure of a big deal could prove hard to resist, particularly if Google's strategic position is threatened. For the past two months, Google has been battling Microsoft Corp. () at the bargaining table for a stake in Time Warner Inc.'s () AOL unit, possibly through an expanded partnership or a joint venture. Google has all but owned the AOL relationship since 2002, providing both search technology and ads. AOL has meant big business for Google, accounting for 11% of its $2.6 billion gross revenues in the first half of this year. But perhaps more compelling to Google is AOL's access to reams of content owned by sister companies such as Time Inc. and cable channel HBO.

The negotiations are taking Google into uncharted territory. Some analysts value AOL's business as high as $20 billion, including about $12 billion for the coveted portal and search pieces. The search kingpin could prevail with an expanded partnership and shell out virtually nothing. But the fact that Google is still at the high-stakes table shows how much it could lose if AOL walks.

Such strategic contingencies weren't mapped out in the coy statements made in Google's prospectus when it first sold shares to the public 15 months ago. "We would fund projects that have a 10% chance of earning a billion dollars over the long term," wrote founders Sergey Brin and Larry Page. And then they added: "Do not be surprised if we place smaller bets in areas that seem very speculative or even strange. As the ratio of reward to risk increases, we will accept projects further outside our normal areas, especially when the initial investment is small." That's enough to give hope but not much direction to would-be partners and dealmakers.

Rainmakers at blue-chip investment banks are accustomed to a certain level of respect -- something that Google is unwilling to grant automatically. Just ask Goldman, Sachs & Co. () Goldman famously got the boot from the elite group selected to manage Google's IPO after Brin and Page caught wind of the firm's backroom lobbying of one of Google's largest VCs for a bigger stake in the deal. The bank has been trying to crawl out of the woodshed ever since. Goldman declined to comment.

"The First Inning"
In fact, Brin and Page have made a sport of snubbing Wall Street since they co-founded the company in 1998. They've made it clear that Google plays by its own rules and values. Their August, 2004, IPO filing reads more like a manifesto than the usual drab financial boilerplate. And by masterminding the IPO as a modified Dutch auction, they thumbed their noses at Wall Street's traditional trust-us-and-we'll-handle-everything way of doing business.

Still, many bankers believe that in the new Google-centric universe, immense profits are to be made, even if Google itself remains tightfisted. "This is an investment banking gold rush," says Perseus' Baldwin, as he whips out a glossy pitch book and points to statistics illustrating massive changes in the world of advertising and media. Those trends may be led by Google, but they imply some wrenching tectonic shifts throughout the media world. And in those dislocations lies opportunity for astute investors and dealmakers.

Last year U.S. advertising spending was an estimated $300 billion to $400 billion. Just $10 billion of that was spent online, even less than for ads in the Yellow Pages. By contrast, newspaper and direct telephone markets were worth five and nine times as much, respectively. Yet, according to Forrester Research Inc., households now spend at least 30% of their media time online, while the Internet has just 5% of total ad spending. That situation won't last for long. According to the Interactive Advertising Bureau and PricewaterhouseCoopers, online ad revenue grew 34% in the latest quarter, with total 2005 revenue on track to grow by 25%, to at least $12 billion; newspaper ad revenue, by contrast, is slated to grow less than 3% this year. Baldwin says that Perseus has a backlog of six portal and e-marketing transactions poised to benefit from this revenue reallocation in Google's wake, and is on pace to complete at least 30 deals in 2005, twice last year's tally.

Google's own bankers have also seen the possibilities lurking in the company's $120 billion shadow. "You almost bank on other companies becoming successful because of Google," says banker Quincy Smith of Allen & Co., which represents Google. He points to Advertising.com, an e-marketing client that appeared on his radar when he noticed that 40% of its revenue came through Google. Allen & Co. helped sell the company to AOL for $435 million in June, 2004 -- demonstrating how even a dormant Google made the bank money. Another major Google banker hammered home the 5% online ad market share figure in a presentation to institutional shareholders interested in Google's $4.2 billion secondary share offering on Sept. 16: "I told them, 'Oh my God, we're just in the first inning. Advertising will be completely turned on its ear."'

In the Silicon Valley food chain, the first to lay bets on which way things will shake out are the venture capitalists whose fate is now firmly entwined with that of Google. It's not a very comfortable position for VCs, who view Google with a mixture of disdain and envy. Googlers, as they're known -- many of whom have emerged from their company's remarkable increase in value with sizable personal fortunes -- work in one of the cushiest corporate campuses in the Valley. There's the free cafeteria that was started by Google's millionaire former chef, who used to work for Jerry Garcia of the Grateful Dead, as well as facilities for volleyball, foosball, and rollerblading. After their workouts, Googlers can snack in a stocked pantry or enjoy an on-site massage. Young Googlers' preoccupation with these perks tend to drive mature VCs to distraction. "If I hear one more [punk] complain about his omelet, or tell me he's bored with the smoothie selection, I'm gonna, I don't know," splutters one.

Of course, such luxuries aren't the real problem. It's what the VCs perceive as arrogance and a lack of respect for the role they play. VCs, after all, have at some point identified, believed in, nurtured, and funded -- not to mention made huge profits from -- the biggest names in techdom, from eBay to Cisco Systems and Google itself. Yet many feel that Google accords them roughly the same respect as it does vendors bidding on the groundskeeping contract.

Startup Day
Many VCs, for example are still fuming over the "Google Startup Day." VCs, who are used to making elaborate and proprietary pitches to potential investors, were instead summoned as a group to take turns making their spiels to Google's 10-person corporate development group. "Check out the gall," says one, sharing an Aug. 3 e-mail from Google's in-house M&A team. "Hi Very Senior Partner," the mass memo says by way of salutation. After explaining the hoops through which the VCs would have to jump to go to Startup Day, it asks those interested to "please fill in the attached spreadsheet with a brief description of each company and its business/technology, an overview of the team, any data points you would like to share, and a perspective of why the company might work with Google." Says the aggrieved VC: "Did it ever occur to them that this was like asking us to do their homework for them? It's the height of arrogance." Not so, responds Google's Drummond: "This was an attempt at outreach," he says. "Most VCs do like to talk to us. Google is very much involved in the venture community -- a lot more than people understand."

All the same, two Google insiders privately groused to BusinessWeek about the stunt. These companies would be foolish to cough up their trade secrets to Google, they contend, while the search giant offers little information in return.

Although Startup Day never happened, Google said it did subsequently meet with individual VCs. As Credit Suisse First Boston's George Boutros, a lead Google banker, says: "If Google wants access to the venture community, Google gets access to the venture community."

Plug'N'Play Acquisitions
VCs have another more concrete reason to resent Google: With its deep pockets and its unwillingness to give quarter to outside professionals, it's now a growing competitor to Valley VCs. Google can easily afford to swoop in and outbid any VC for a startup, particularly if Brin and Page truly mean they would be happy with a 1-in-10 chance of an investment paying off big. That's encouraging entrepreneurs to "bootstrap it" -- go it alone, lean, mean, and cheap, without the help of expensive VCs, in the hopes of pocketing a bigger share of the proceeds of a sale to Google. For example, Google bought both Blogger.com parent Pyra Labs and wireless player Android Inc. directly from their founders. According to people familiar with the deal, the Android buyout was essentially a bet on the company's star-studded cast, including engineering whiz Andy Rubin, who previously had founded handset maker Danger Inc. Co-founder Page, the sources say, put the acquisition on the fast track.

Indeed, Google strongly prefers to gobble up startups before they have embarked on a sales and marketing strategy, viewing companies that are completely tech-focused as a better cultural fit. It prefers to acquire small, local technology teams that it can simply plug into its headquarters. "Two guys in a garage with nose rings and a dog trying to catch lightning in a bottle" is how banker Smith characterizes the bias. Case in point: Last year Google snapped up Keyhole, a digital mapping company based next door in Mountain View, for an undisclosed sum. Its team moved down the road and within six months, Keyhole was providing the satellite technology behind Google's celebrated mapping tool. Conversely, Google has passed on larger, out-of-town deals, in large part because of integration worries.

Google is creating a whole new ecosystem for entrepreneurs, says Baris Karadogan of U.S. Venture Partners, a high-tech VC firm in Silicon Valley. Karadogan says he's closely watching a group of entrepreneurs who are designing a highly specialized online advertising tool, hoping to sell it to Google for $50 million. "Before," he laments, "you needed a VC. Now you can build a Linux-based data system for $100,000 and survive long enough to sell without ever raising a venture round."

The suits inside Google don't fare much better than the outside pros. Several current and former insiders say there's a caste system, in which business types are second-class citizens to Google's valued code jockeys. They argue that it could prove to be a big challenge in the future as Google seeks to maintain its growth. They deem the corporate development team as underpowered in the company, with engineers and product managers tending to carry more clout than salesmen and dealmakers.

A banker who interviewed for a Google corporate development job came to a similar conclusion. "They just aren't very focused," says the prospective hire, who didn't get the job. "They're biased against businesspeople, and their deal strategy is pretty much, 'O.K., if we see something, then we'll look at it."' The candidate, a Wall Street tech M&A specialist who was looking for a change of scenery and a more relaxed lifestyle, calls the experience "chaotic, bureaucratic, and very rigid." Strung out over more than nine months and numerous coast-to-coast flights, the courtship culminated in a jarring "pop quiz." The corporate development team suddenly broke from the script and gave the banker a laptop and 40 minutes to value a business, suggest a strategic buyer, and present a case to the entire team.

Drummond rejects the accusations that Google is anti-businesspeople. He says Google has hired many MBAs and bankers and is constantly assessing its dealmaking strategy. "At some point," he adds, "it might make sense for us to be [acquisitive] like a Cisco or GE."

Apparently, that time has not yet come. Surprisingly for a company of Google's size, clout, and business needs, it doesn't yet have a thriving in-house VC arm. And that's despite some glaring holes in its product lineup. "We're clearly not going to do everything right," concedes Drummond. "There are areas we miss that others will fill out." For starters, Google has a long way to go to match the breadth, depth, and richness of Yahoo's portal. Ditto a peer-to-peer marketplace along the lines of an eBay, as well as Microsoft-like software applications.

Despite the hurdles they face, don't expect any of the legions of investment bankers, VCs, or entrepreneurs to fold their tents and go home. The stakes are too big, and everyone wants in. To steal a note from the Google home page: Feeling lucky?


By Roben Farzad and Ben Elgin, with Catherine Yang in Washington

source:http://www.businessweek.com/print/magazine/content/05_49/b3962001.htm?chan=gl

Unleashing the power of the Cell Broadband Engine

16 Nov 2005

This paper from the MPR Fall Processor Forum 2005 explores programming models for the Cell Broadband Engine (CBE) Processor, from the simple to the progressively more advanced. With nine cores on a single die, programming for the CBE is like programming for no processor you've ever met before. Read why.

The Cell Broadband Engine (CBE) Processor offers the potential for increased processor performance for a broad variety of applications. However, coming anywhere close to the theoretical performance capability of the processor requires a good understanding of the processor's capabilities, and the choice of a programming model which matches the processor's architecture.

This paper reviews the basic architecture of the CBE processor and some of the programming models which fit well with its design.

The basic CBE architecture


Figure 1. The CBE block diagram

The CBE processor contains a PowerPC® processor element, used as a primary processor, and eight "synergistic" processor elements. The architecture allows any SPE to take up a controller role if needed. These are called the PPE and SPEs, respectively (see the sidebar on acronyms). The CBE processor also contains much bandwidth. Each of the eight SPEs has 256KB of local storage for code and data, and 128 registers, each 128 bits wide. The instruction set for the SPEs is designed to favor SIMD processing. The SPEs do not have any hardware cache of main memory.

The closeness of each SPU to its 256KB of local store makes it easy to note the abstract similarity to a cache. SPE programmers can manage the local store to keep frequently used pieces of data. However, from the hardware-architecture point of view, they are not the same. Caches hold temporary copies of physical memory. The local storage on each SPE is not associated with some region of physical memory; it is a private, non-coherent, local store. Data can be transferred directly from one SPE's local storage to another, without going through physical memory. The internal bus, called the Element Interconnect Bus, has a bandwidth of roughly 100GB/sec; for more information on the ways data moves around the CBE, see the related article, "Unleashing the Cell Processor: The Element Interconnect Bus," to be published next week.

Each SPE can communicate with the PPE through mailboxes, which are registers available to a given SPE and the main processor. The three three mailboxes are: inbound and outbound non-interrupting mailboxes and an outbound interrupting mailbox. The interrupts allow notification and communication in a quick and efficient manner.



Back to top


Levels of parallelism

Acronym alley

The CBE processor has a broad feature set for which a number of terms have been coined. Following are a few of the acronyms you will see used in discussions of the Cell Broadband Engine:

PPE - PowerPC Processing Element. This is a two-thread, dual-issue, processor. Unlike most modern PowerPC chips, it executes in-order, and has a comparatively short pipeline.

SPE - Synergistic Processing Element. This is a specialized processor with a small amount of local storage and its own access to system memory. SPEs are capable of running independently of PPE as independent processors. They may also run under the control of the PPE, and are used to offload computationally intensive tasks.

CESOF - Cell Embedded SPE Object Format. An object format used to bundle SPE code together with PPE code. It gives the PPE a simple handle that can be used to hand code off to a given SPE. The format also enables the SPE code to reference global objects defined in the main memory. In fact, the CESOF is an ELF format with additional sections to support symbol resolution and embedding SPE ELF objects within PPE ELF objects .

DMA - Direct Memory Access. Generically, transfer of memory directly from one part of a system to another without processor interaction. Within the CBE, DMA is also used to refer to moving data between, for instance, processor elements and main memory, or between two processor elements.

EIB - Element Interconnect Bus. This is the bus that connects the various processor elements to memory and other I/O.

MFC - Memory Flow Controller. The part of an SPE which carries out DMA operations and moves data around.

LS - Local storage. 256KB of shared instruction and data storage local to each SPE. (Not to be mistaken for a cache.)

SIMD - Single Instruction Multiple Data. The simple way to do parallelism, as in the PowerPC's VMX/AltiVec instructions.

CBEA - Cell Broadband Engine Architecture. Strictly speaking, the Cell Broadband Engine is the first CBEA processor, and is often called the Cell.

IDL - Interface Definition Language.

Several kinds of parallelism are available when developing applications for the CBE. For starters, both the PPE and the SPEs have SIMD instructions available, so a single instruction can perform multiple simultaneous operations. They are also superscalar, capable of executing two instructions per clock cycle. This level of parallelism is familiar to PowerPC developers already from the VMX/AltiVec instructions available on recent PowerPC processors.

Each processing element can be performing a different ongoing task, which allows for task-level parallelism. The PPE is dual-threaded, and there are 8 SPE cores, allowing a total of ten tasks at once (two on the PPE, and one on each SPE). Each task, in turn, could be using SIMD instructions to process large amounts of data.

While all of this processing is going on, the DMA engines (MFCs) on each SPE can also be moving data around. This is a separate component of the architecture, and need not prevent the processors from operating on the data already available to them. Thus, the CBE on-chip cores don't need to spend much time moving data around.

Finally, you can have multiple CBE processors in a system, or even multiple systems in a cluster. This level of parallelism is fairly well understood and is not specific to Cell. For more on data coherency, see "Unleashing the Cell Processor: The Element Interconnect Bus," to be published next week.

The array of options here is potentially bewildering. You should adopt programming models designed to make efficient use of the available resources. A good understanding of the ways in which you can use the CBE processor makes it much easier to develop efficient, reliable code that can be delivered on a useful schedule. A good programming model makes good use of the huge computational capacity and bandwidth the CBE provides, dividing work up among the various processing components available. Furthermore, use of consistent models allows the development of language constructs, libraries, frameworks, or even operating system support to simplify development.

This paper reviews both "small" (local-store only) and "large" (using external code or data) single-SPE programming models, as well as multiSPE parallel models. At the end, it also describes the multitasking aspect of sharing the SPEs.



Back to top


Programming the PPE

Before getting into the details of programming the SPEs, you need to understand the role of the PPE. The PPE is a 64-bit PowerPC chip, designed to run general-purpose code and facilitate the SPEs. The CESOF object format (remember to see the Acronyms sidebar) is used to store a chunk of code for delivery to an SPE. Each SPE image is associated with a handle which can be used at runtime to load specific code on an SPE. The PPE handles memory mapping and exception handling, to load code on the SPEs, and to start and stop their execution. In general, but not always, scheduling of the SPEs is left up to the PPE, and OS services (such as file I/O) also run on the PPE.



Back to top


Small single-SPE models

The simplest way to use a single SPE is to load a single chunk of code on it, along with the data it needs to process, and let it run. The SPE runs entirely out of its local data store, with no access to (or bandwidth load on) main memory. Many workloads can be handled entirely this way, but code and data together must fit in 256KB.

In this model, input and output are always explicit. The SPE program is given arguments (passed in as arguments to a main function) and returns an exit status. It can also communicate using the mailboxes, or by system calls. This model might be supported by an IDL. SPE executables are compiled and linked separately, then embedded as read-only data in the PPE executable, using the CESOF format. (The CESOF object is bundled into a section of the ELF object file for the PPE executable.) At runtime, the PPE loads and initializes the SPE, then starts it running on the code.

See also the "SPU Application Binary Interface Specification," listed in the Resources section of this document.

The following code listings show how this works:


Listing 1. A program to run on the SPE


/* spe_foo.c
* A C program to be compiled into an executable called "spe_foo"
*/

int main(unsigned long long speid, addr64 argp, addr64 envp)


{
int i;
/* func_foo would be the real code */
i = func_foo(argp);
return i;
}

Listing 2: A program to run another program on the SPE.

/* spe_runner.c
* A C program to be linked with spe_foo and run on the PPE.
*/

extern spe_program_handle_t spe_foo;

int main()
{
int rc, status = 0;
speid_t spe_id;

spe_id = spe_create_thread(0, &spe_foo, 0, NULL, -1, 0);

rc = spe_wait(spe_id, &status, 0);

return status;
}

Note that the result of spe_wait and the status code returned by the SPE program are distinct; if spe_wait succeeds, then status will be filled in with the value returned from the SPE program. Interaction between the SPE and the PPE is not needed until execution completes. The spe_wait operation blocks until the SPE program exits.

Another option is to load multiple pieces of code and data to a single SPE; this can be the basis of a primitive multitasking environment on the SPE, useful for multiple small jobs which do not need a dedicated processor. You cannot provide memory protection between tasks running on a single SPE, and such multitasking is necessarily cooperative, not preemptive. However, in cases where the tasks are small enough, and complete reliably enough, this can dramatically improve performance, freeing up other SPEs for dedicated tasks. The cost of transferring a small program to the SPE might be too high in some cases, however.



Back to top


Large single-SPE programming models

When all your code and data together cannot be fit entirely within 256KB, you might need to use a "large" model. In this model, the PPE reserves chunks of effective address space for use by the SPE program, which accesses them through DMA. Memory mapping into effective address space is set up to give the SPE a secondary memory store which it can access using the DMA engine (MFC).

You can use this model in many ways. One is the streaming model: load a regular chunk of sequential data, modify it, write it back to main memory, and repeat. Another is to use the local store as a temporary buffer, copying random data back and forth as needed.

In some cases, the same techniques could be used for code, not just data; the primary code loaded on the SPE could use overlay segments located in main memory as-needed. The compiler can generate automatic overlaying code to handle this case. CESOF, and the toolchains in use, allow SPE code to refer to objects defined in the effective address space.

The simple LS-resident multitasking possible on a single SPE becomes somewhat more flexible when combined with automatic loading and storing of job code and data; a small kernel running on the SPE can load tasks, or swap them out when blocked or completed, allowing the SPE to manage multiple tasks from a job queue. Once again, this is still not preemptive.

One consideration when using DMA to span the effective memory space of an SPE is that it imposes significant latency. With that in mind, prefetching (also known as double-buffering or multibuffering, particularly in game programming) becomes an important technique. If, while buffer N is being processed, buffer N-1 is being written out, and then buffer N+1 is being read in, the processor can execute continuously, even if the time required to transfer the data is a substantial fraction (up to half) of the time it takes to perform an operation.



Back to top


MultiSPE programming models

It is possible to combine the work of multiple SPEs. Synchronization becomes an issue here. Options include MFC atomic update commands, mailboxes, SPE signal notification registers, events and interrupts, or even just polling of shared memory. As with large single-SPE models, a compiler (for example, openMP) might transparently manage access to shared memory with proper critical section access controls.

The job queue model is a popular model for programming the CBE, which allows any idling SPE to obtain another task quickly, providing automatic load balancing. One special case of this that optimizes particularly well for regular and sequential chunks is the streaming model. If a given piece of data can be processed quickly enough by a single SPE, but there is too much sequential data of that sort for a single SPE to process quickly enough, multiple SPEs can be assigned to process the array of data, pulling new blocks of data off a FIFO queue and processing them simultaneously.

Another option for streaming is the pipeline, where each SPE handles part of a task, processing the output from the previous SPE. This might make heavy use of direct LS to LS DMA, bypassing main memory to reduce bandwidth use. This allows SPEs to perform tasks which need too much code to leave any room for efficient data handling. The code can be split up among multiple SPEs, allowing data to be handed across quickly. This is a good example of the use of the DMA channels for message-passing. On the down side, load balancing is much harder than it is with the previously mentioned streaming setup. If a given chunk of data cannot be processed quickly enough by a single SPE, code overlays might be a better fit.



Back to top


Kernel management of SPEs

An OS running on the PPE can manage and allocate SPEs, providing and arbitrating access to them. Making the SPEs available like this allows preemptive multitasking of more tasks than there are SPEs to run them. Running tasks or threads can be mapped onto SPEs, paused and copied out, resumed, and so on. Because the context-switch cost is relatively large (the whole 256KB of local store, 128x16B register file, and DMA command queues), a run-to-completion policy is of course strongly favored, but the option of preemption is there. This can allow for memory protection between tasks, because a task will be swapped out completely before another task is loaded on the same SPE.



Back to top


Application development

Everything you've ever been told about application optimization applies more so to the CBE architecture. Choice of algorithms, interactions between algorithms, and related issues are crucial to effective development. Budget some time for experimentation; partition the algorithm and program, see how it works, and be prepared to try again. Start with the code that will run on the PPE, then offload specific tasks to SPEs. Switch to SIMD code on the SPEs if you need to, but be sure your overall algorithm partitioning is working before you spend a lot of time vectorizing code that will have to be rewritten anyway.

When targeting a CBE processor, you have to budget both computation and bandwidth. There's plenty of both, but the sheer volume of computation available can swamp your bandwidth, and the sheer volume of data available can swamp your processing. If you have bandwidth crunches, look for ways to calculate data rather than copying data, and look for ways to do more calculations before passing the data onward.

Look for bottlenecks when benchmarking your code. The PPE can easily become a bottleneck if you rely too heavily on precalculating what you want the SPEs to do. If an operation is taking too long on a single SPE, look into splitting the work.



Back to top


Conclusion

A good choice of programming model and a clear understanding of the many models possible on the CBE architecture can reduce development cost while improving performance. Abstractions, such as streaming and job-queue programming models, and development tools are crucial to reliable and efficient development. Don't be afraid to mix programming models; you may find the best design has two SPEs running unique tasks, two SPEs streaming a common task, and a four-SPE pipeline handling a particularly complicated task. You are not required to use all the SPEs in the same way. New applications may suggest new programming models; budget time for experimentation. Streaming can emulate the function of pipelining, although it might impose a slight additional cost.

The CBE architecture makes it virtually certain that a fairly easy development effort will result in an impressive performance gain over a more traditional processor architecture, but achieving top performance is difficult.



Back to top


Acknowledgments

This article was adapted by Peter Seebach, working from the original presentation "Unleashing the power of Cell Broadband Engine: A programming model approach," presented at MPR Fall Processor Forum 2005 by Alex Chow of IBM. Peter would like to thank Tim Kelly, Alex Chow, and Daniel Brokenshire for technical and editorial review during the writing process.



Back to top


Resources

Learn

Get products and technologies

Discuss


Back to top


About the author


The developerWorks Power Architecture editors welcome your comments on this article. E-mail them at dwpower@us.ibm.com.


source:http://www-128.ibm.com/developerworks/power/library/pa-fpfunleashing/?ca=dgr-lnxw01CellUnleash


Former Canadian Minister Of Defence Asks Canadian Parliament Asked To Hold Hearings On Relations With Alien "Et" Civilizations

OTTAWA, CANADA (PRWEB) November 24, 2005 -- A former Canadian Minister of Defence and Deputy Prime Minister under Pierre Trudeau has joined forces with three Non-governmental organizations to ask the Parliament of Canada to hold public hearings on Exopolitics -- relations with “ETs.”

By “ETs,” Mr. Hellyer and these organizations mean ethical, advanced extraterrestrial civilizations that may now be visiting Earth.

On September 25, 2005, in a startling speech at the University of Toronto that caught the attention of mainstream newspapers and magazines, Paul Hellyer, Canada’s Defence Minister from 1963-67 under Nobel Peace Prize Laureate Prime Minister Lester Pearson, publicly stated: "UFOs, are as real as the airplanes that fly over your head."

Mr. Hellyer went on to say, "I'm so concerned about what the consequences might be of starting an intergalactic war, that I just think I had to say something."

Hellyer revealed, "The secrecy involved in all matters pertaining to the Roswell incident was unparalled. The classification was, from the outset, above top secret, so the vast majority of U.S. officials and politicians, let alone a mere allied minister of defence, were never in-the-loop."

Hellyer warned, "The United States military are preparing weapons which could be used against the aliens, and they could get us into an intergalactic war without us ever having any warning. He stated, "The Bush administration has finally agreed to let the military build a forward base on the moon, which will put them in a better position to keep track of the goings and comings of the visitors from space, and to shoot at them, if they so decide."

Hellyer’s speech ended with a standing ovation. He said, "The time has come to lift the veil of secrecy, and let the truth emerge, so there can be a real and informed debate, about one of the most important problems facing our planet today."

Three Non-governmental organizations took Hellyer’s words to heart, and approached Canada’s Parliament in Ottawa, Canada’s capital, to hold public hearings on a possible ET presence, and what Canada should do. The Canadian Senate, which is an appointed body, has held objective, well-regarded hearings and issued reports on controversial issues such as same-sex marriage and medical marijuana,

On October 20, 2005, the Institute for Cooperation in Space requested Canadian Senator Colin Kenny, Senator, Chair of The Senate Standing Senate Committee on National Security and Defence, “schedule public hearings on the Canadian Exopolitics Initiative, so that witnesses such as the Hon. Paul Hellyer, and Canadian-connected high level military-intelligence, NORAD-connected, scientific, and governmental witnesses facilitated by the Disclosure Project and by the Toronto Exopolitics Symposium can present compelling evidence, testimony, and Public Policy recommendations.”

The Non-governmental organizations seeking Parliament hearings include Canada-based Toronto Exopolitics Symposium, which organized the University of Toronto Symposium at which Mr. Hellyer spoke.

The Disclosure Project, a U.S.– based organization that has assembled high level military-intelligence witnesses of a possible ET presence, is also one of the organizations seeking Canadian Parliament hearings.

Vancouver-based Institute for Cooperation in Space (ICIS), whose International Director headed a proposed 1977 Extraterrestrial Communication Study for the White House of former U.S. President Jimmy Carter, who himself has publicly reported a 1969 Close Encounter of the First Kind with a UFO, filed the original request for Canadian Parliament hearings.

The Canadian Exopolitics Initiative, presented by the organizations to a Senate Committee panel hearing in Winnipeg, Canada, on March 10, 2005, proposes that the Government of Canada undertake a Decade of Contact.

The proposed Decade of Contact is “a 10-year process of formal, funded public education, scientific research, educational curricula development and implementation, strategic planning, community activity, and public outreach concerning our terrestrial society’s full cultural, political, social, legal, and governmental communication and public interest diplomacy with advanced, ethical Off-Planet cultures now visiting Earth.”

Canada has a long history of opposing the basing of weapons in Outer Space. On September 22, 2004 Canadian Prime Minister Paul Martin declared to the U.N. General Assembly,” "Space is our final frontier. It has always captured our imagination. What a tragedy it would be if space became one big weapons arsenal and the scene of a new arms race.

Martin stated, "In 1967, the United Nations agreed that weapons of mass destruction must not be based in space. The time has come to extend this ban to all weapons..."

In May, 2003, speaking before the Canadian House of Commons Standing Committee on National Defence and Veterans Affairs, former Minister of Foreign Affairs of Canada Lloyd Axworthy, stated “Washington's offer to Canada is not an invitation to join America under a protective shield, but it presents a global security doctrine that violates Canadian values on many levels."

Axworthy concluded, “There should be an uncompromising commitment to preventing the placement of weapons in space.”

On February 24, 2005, Canadian Prime Minister Paul Martin made official Canada's decision not to take part in the U.S government’s Ballistic Missile Defence program.

Paul Hellyer, who now seeks Canadian Parliament hearings on relations with ETs, on May 15, 2003, stated in Toronto’s Globe & Mail newspaper, “Canada should accept the long-standing invitation of U.S. Congressman Dennis Kucinich of Ohio to launch a conference to seek approval of an international treaty to ban weapons in space. That would be a positive Canadian contribution toward a more peaceful world.”

In early November 2005, the Canadian Senate wrote ICIS, indicating the Senate Committee could not hold hearings on ETs in 2005, because of their already crowded schedule.

“That does not deter us,” one spokesperson for the Non-governmental organizations said, “We are going ahead with our request to Prime Minister Paul Martin and the official opposition leaders in the House of Commons now, and we will re-apply with the Senate of Canada in early 2006.

“Time is on the side of open disclosure that there are ethical Extraterrestrial civilizations visiting Earth,” The spokesperson stated. “Our Canadian government needs to openly address these important issues of the possible deployment of weapons in outer war plans against ethical ET societies.”

Word Count: [1011

Canadian Exopolitics Initiative http://www.peaceinspace.net

Click here to send your letter to the Parliament of Canada requesting public “ET” Hearings http://exopolitics.blogs.com/star_dreams_initiative/2005/10/the_senate_of_c.html

CONTACT NOW: Toronto, Canada: Victor Viggiani, Exopolitics Toronto Symposium Tel: 905-278-5628 http://www.exopoliticstoronto.com

Winnipeg, Canada: Randy Kitchur Tel: 204-582-4424

Washington, D.C.: Dr. Steven Greer, The Disclosure Project Tel: (540) 456-8302 (Office) http://www.disclosureproject.org

Vancouver, Canada: Alfred Lambremont Webre, JD, MEd ICIS-Institute for Cooperation in Space Tel: 604-733-8134 http://www.peaceinspace.net

###

ICIS Alfred Webre 604-733-8134 E-mail Information

source:http://news.yahoo.com/s/prweb/20051124/bs_prweb/prweb314382_1&printer=1;_ylt=A9FJqZdBP4tDljcBgw861sIF;_ylu=X3oDMTA3MXN1bHE0BHNlYwN0bWE-


This page is powered by Blogger. Isn't yours?