Download as pdf or txt
Download as pdf or txt
You are on page 1of 62

Hardware

Machine Learning
Robotics
Security and
Privacy

JULY 2021 www.computer.org


IEEE COMPUTER SOCIETY JOBS BOARD

Evolving Career
Opportunities
Need Your Skills
Explore new options—upload your resume today

Changes in the marketplace shift demands for vital skills


www.computer.org/jobs and talent. The IEEE Computer Society Jobs Board is a
valuable resource tool to keep job seekers up to date on
the dynamic career opportunities offered by employers.
Take advantage of these special resources for job seekers:

JOB ALERTS TEMPLATES WEBINARS

CAREER RESUMES VIEWED


ADVICE BY TOP EMPLOYERS

No matter what your career level, the IEEE Computer


Society Jobs Board keeps you connected to
workplace trends and exciting career prospects.
IEEE COMPUTER SOCIETY computer.org

STAFF
Editor Publications Portfolio Managers
Cathy Martin Carrie Clark, Kimberly Sperka

Publications Operations Project Specialist Publisher


Christine Anthony Robin Baldwin

Production & Design Artist Senior Advertising Coordinator


Carmen Flores-Garvey Debbie Sims

Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th
Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380;
fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036.
Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage
Paid at New York, New York, and at additional mailing offices. Printed in USA.
Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in
ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style,
clarity, and space.
Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for
profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-
party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web
servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy.
An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-
editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications
/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new
collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane,
Piscataway, NJ 08854-4141 or pubs-permissions@ieee.org. Copyright © 2021 IEEE. All rights reserved.
Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons,
provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive,
Danvers, MA 01923.
Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at help@
computer.org and type “unsubscribe ComputingEdge” in your subject line.
IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

IEEE Computer Society Magazine Editors in Chief

Computer IEEE Intelligent Systems IEEE Pervasive Computing


Jeff Voas, NIST V.S. Subrahmanian, Marc Langheinrich, Università
Dartmouth College della Svizzera italiana
Computing in Science
& Engineering IEEE Internet Computing IEEE Security & Privacy
Lorena A. Barba, George George Pallis, University Sean Peisert, Lawrence
Washington University of Cyprus Berkeley National
Laboratory and University
IEEE Annals of the History IEEE Micro of California, Davis
of Computing Lizy Kurian John, University
Gerardo Con Diaz, University of Texas at Austin IEEE Software
of California, Davis Ipek Ozkaya, Software
IEEE MultiMedia Engineering Institute
IEEE Computer Graphics Shu-Ching Chen, Florida
and Applications International University IT Professional
Torsten Möller, Irena Bojanova, NIST
Universität Wien

2469-7087/21 © 2021 IEEE Published by the IEEE Computer Society July 2021 1
JULY 2021 � VOLUME 7 � NUMBER 7

18
Learning From
38
Parallel and
44
Flexibility in
Prototypes Distributed Production Systems
Systems by Exploiting
Cyberphysical
Systems
Hardware
8 Long Tail Hardware: Turning Device Concepts Into Viable
Low Volume Products
STEVE HODGES AND NICHOLAS CHEN

18 Learning From Prototypes


ZBIGNIEW STACHNIAK

Machine Learning
28 Monolithically Integrated RRAM- and CMOS-Based
In-Memory Computing Optimizations for Efficient
Deep Learning
SHIHUI YIN, YULHWA KIM, XU HAN, HUGH BARNABY, SHIMENG YU,
YANDONG LUO, WANGXIN HE, XIAOYU SUN, JAE-JOON KIM, AND
JAE-SUN SEO

38 Parallel and Distributed Systems


MANISH PARASHAR

Robotics
40 To Err is Human, to Forgive, AI
PHIL LAPLANTE AND BEN AMABA

44 Flexibility in Production Systems by Exploiting


Cyberphysical Systems
ARNDT LÜDER

Security and Privacy


49 Bert Hubert on the Domain Name System
GAVIN HENRY

52 A Cybersecurity Terminarch: Use It Before We Lose It


ERIC OSTERWEIL

Departments
4 Magazine Roundup
7 Editor’s Note: Designing Hardware—from Prototype to Product
58 Conference Calendar

Subscribe to ComputingEdge for free at


www.computer.org/computingedge.
Magazine Roundup

T he IEEE Computer Society’s lineup of 12 peer-reviewed technical magazines covers cutting-edge topics rang-
ing from software design and computer graphics to Internet computing and security, from scientific appli-
cations and machine intelligence to visualization and microchip design. Here are highlights from recent issues.

data repositories: performance, says yes. This article from the Jan-
reliability, cost-effectiveness, col- uary–March 2021 issue of IEEE
Visualizing Logical laboration, reproducibility, cre- Annals of the History of Com-
Correlation in Trace Data ativity, downstream impacts, puting discusses what such arti-
for System Debugging and access and inclusion. These facts can teach us about modern
objectives motivate a set of best companies. IBM is used as a case
This article from the March 2021 practices for cloud-native data study because it is both iconic and
issue of Computer describes a repositories: analysis-ready data, emblematic of large-scale twenti-
mechanism that enables debug cloud-optimized (ARCO) formats, eth-century business. It is a com-
engineers to extract and visual- and loose coupling with data- pany that continues to operate
ize the logical correlation among proximate computing. The Pan- within a highly defined corporate
events and messages in system- geo Project has developed a pro- culture. The authors describe a
level trace data. It enables debug totype implementation of these selection of material objects and
engineers to focus only on trace principles using open-source sci- their role in IBM’s activities. To do
packets that are logically corre- entific Python tools. By providing that, they situate the objects into
lated to the issue under debug. an ARCO data catalog together Edgar Schein’s model of organi-
with on-demand, scalable distrib- zational culture, since his is one
uted computing, Pangeo enables of the most widely accepted con-
users to process big data at rates structs of corporate culture.
Cloud-Native Repositories exceeding 10 GB/s.
for Big Scientific Data

Scientific data have traditionally Exploring the Design Space


been distributed via downloads From Lapel Pins to Coffee of Sankey Diagrams for the
from data server to local com- Cups: Links Between Food-Energy-Water Nexus
puter. This way of working suf- Corporate and Material
fers from limitations as scien- Culture, Lessons From IBM In this article from the March/
tific datasets grow toward the April 2021 issue of IEEE Computer
petabyte scale. A “cloud-native Archeologists, sociologists, and Graphics and Applications, the
data repository,” as defined in cultural anthropologists analyze authors define a set of design
this article from the March/April objects to gain insights about requirements relating to Sankey
2021 issue of Computing in Sci- human behavior. Can historians diagrams for supporting food–
ence & Engineering, offers sev- use the same approach to study energy–water nexus understand-
eral advantages over traditional corporate cultures? The evidence ing. They propose the network

4 July 2021 Published by the IEEE Computer Society 2469-7087/21 © 2021 IEEE
embodied sectoral trajectory dia- complicated structures to solve
gram design, a visualization design various kinds of problems con-
that incorporates a number of cerning money laundering in the The Xbox Series X
characteristics from Sankey dia- real world. System Architecture
grams, treemaps, and graphs, to
improve the readability and mini- The Xbox Series X console,
mize the negative impact of edge released in November 2020, con-
crossings that are common in tra- HateClassify: A Service tains a system on chip (SoC) cre-
ditional Sankey diagrams. Framework for Hate Speech ated in partnership with AMD. This
Identification on Social Media article from the March/April 2021
issue of IEEE Micro describes the
It is a challenge for existing architecture, including the intel-
An Efficient Solution to machine-learning approaches to ligence for input processing, ren-
Detect Common Topologies in differentiate hateful content from dering game graphics and audio,
Money Launderings Based on content that is merely offensive. managing storage, user services,
Coupling and Connection One reason for this low accuracy and security—all under a tiered
in hate detection is that these operating system.
Every money-laundering case techniques treat hate classifica-
has a unique structure in terms tion as a multiclass problem. In
of transactions. It is not suffi- this article from the January/
cient to detect suspicious behav- February 2021 issue of IEEE Inter- Toward Content-Driven
ior by just following the proba- net Computing, the authors pres- Intelligent Authoring of
bility theory, where usually the ent hate identification on social Mulsemedia Applications
thresholds are given by experts. media as a multilabel problem.
Since the crime of money launder- They propose a CNN-based ser- Synchronization of sensory effects
ing is more prevalent and sophis- vice framework called HateClas- with multimedia content is a non-
ticated nowadays, it will increase sify for labeling social media con- trivial and error-prone task that
the complexity of the detection if tent as hate speech, offensive, or can discourage authoring of mul-
the accounts with personal infor- non-offensive. Results demon- semedia applications. Although
mation are combined with the strate that the multiclass clas- there are authoring tools that per-
form of the transaction topology. sification accuracy for the CNN- form some automatic authoring
Hence, the graph topology analy- based approaches is competitive of sensory effect metadata, the
sis could be used for anti-money with and even higher than cer- analysis techniques that they use
laundering tools. This article from tain state-of-the-art classifiers. are not generally enough to iden-
the January/February 2021 issue The results show that by using tify complex components that
of IEEE Intelligent Systems pro- multilabel classification, instead may be related to sensory effects.
poses eight common topologies of multiclass classification, hate In this article from the January–
based on coupling and connec- speech detection is increased by March 2021 issue of IEEE Multi-
tion from simple to much more up to 20 percent. Media, the authors present a new

www.computer.org/computingedge 5
MAGAZINE ROUNDUP

method that allows for the semi- the same contexts using both a
automatic definition of sensory scripted and in-the-wild study.
effects in an authoring tool. They They then propose positive unla- Influence of Technological
outline a software component to beled context learning (PUCL), Resources on the
be integrated into authoring tools a method to transfer knowledge Development of
that uses content analysis assis- from highly accurate labels of the Mathematical Competence
tance to indicate moments of sen- scripted dataset to the less-accu- in High School
sory effects activation, according rate in-the-wild dataset.
to author preferences. The pro- The use of information and com-
posed method was implemented munication technologies in the
in the STEVE 2.0 authoring tool, process of learning through
and an evaluation was performed A Systems Approach Toward technological resources can be
to assess the precision of the gen- Addressing Anonymous strongly motivating for students.
erated sensory effects in compari- Abuses: Technical and The use of appropriate digital con-
son with human authoring. Policy Considerations tent through simulations and ani-
mations can facilitate the under-
Can we prevent the abuses of standing of complex content. In
anonymous communication net- this article from the March/April
works without affecting their abil- 2021 issue of IT Professional, the
Smartphone Health ity to enhance privacy and evade incidence of the use of techno-
Biomarkers: Positive censorship? The authors of this logical devices by students of the
Unlabeled Learning of In-the- article from the March/April 2021 mathematics subject in Second-
Wild Contexts issue of IEEE Security & Privacy ary Education in Madrid (Spain) is
evaluate approaches for balanc- presented. The sample was of 31
The DARPA-funded Warfighter ing the need for anonymity with students with a low level of com-
Analytics for Smartphone Health- the desire to mitigate anonymous petence in the subject. A quasi-
care (WASH) project is explor- abuses. experimental method of pre-test/
ing passive assessment methods post-test design was used through
using smartphone biomarkers and an experimental group and a con-
context-specific tests. The envi- trol group.
sioned context-specific assess- How Trans-Inclusive
ments require accurate recogni- Are Hackathons?
tion of specific smartphone user
contexts. Existing context data- Hackathons can be fun! However,
sets were either scripted or in for the transgender community
Join the IEEE
the wild. Scripted datasets have and other minorities, hackathons Computer
accurate context labels, but user can have an uncomfortable atmo- Society
behaviors are not realistic. In-the- sphere. In this article from the
computer.org/join
wild datasets have realistic user March/April 2021 issue of IEEE Soft-
behaviors but often have wrong or ware, the authors present a survey
missing labels. The authors of this of 44 LGBTQIA+ people who are
article from the January–March experienced in hackathons and
2021 issue of IEEE Pervasive Com- interviewed seven transgender
puting introduce a novel coinci- participants. The authors intro-
dent data-gathering study design duce five recommendations to
in which data were gathered for make hackathons more inclusive.

6 ComputingEdge July 2021


Editor’s Note

Designing Hardware—
from Prototype to Product

H ardware is in high demand.


Today’s computing land-
scape, which includes mobile com-
overcome the challenges of bring-
ing a working prototype to mar-
ket, and present their vision for
systems—from driverless cars
to smart factories. The authors
of IT Professional’s “To Err is
puting and the Internet of Things, a diverse hardware ecosystem. Human, to Forgive, AI” ponder
requires many types of devices In IEEE Annals of the History of how much trust we should place
that are optimized for diverse func- Computing’s “Learning From Pro- in robots and intelligent systems.
tions—and answers could lie in totypes,” the author posits that Computer’s “Flexibility in Produc-
innovative hardware design. Large examining prototypes of early tion Systems by Exploiting Cyber-
corporations still produce most computers can shed light on the physical Systems” details the
computing hardware, but smaller history of hardware development state of the art in Industry 4.0
organizations and individuals are and the electronics industry. components.
entering the industry, thanks to Hardware is driving many tech- This ComputingEdge issue
increased accessibility of technol- nological advancements, includ- concludes with two articles
ogies like 3D printing and off-the- ing in machine learning (ML). related to online security and pri-
shelf development boards. This IEEE Micro’s “Monolithically Inte- vacy. IEEE Software’s “Bert Hubert
ComputingEdge issue explores the grated RRAM- and CMOS-Based on the Domain Name System”
hardware-development process In-Memory Computing Optimiza- considers the security and pri-
and how new designs are further- tions for Efficient Deep Learning” vacy implications of the Internet’s
ing computer engineering. proposes techniques for energy- Domain Name System (DNS). In
In “Long Tail Hardware: Turn- efficient ML. Computer’s “Par- IEEE Security & Privacy’s “A Cyber-
ing Device Concepts Into Viable allel and Distributed Systems” security Terminarch: Use It Before
Low Volume Products,” from IEEE describes a solution for accelerat- We Lose It,” the author argues
Pervasive Computing, the authors ing training on GPUs. that the DNS Security Extensions
discuss accessible hardware Hardware is critical to (DNSSEC) verification protections
modeling tools, suggest ways to cyberphysical and robotic are underutilized.

2469-7087/21 © 2021 IEEE Published by the IEEE Computer Society July 2021 7
DEPARTMENT: SPECIAL ISSUE SPOTLIGHT This article originally
appeared in

Long Tail Hardware: vol. 18, no. 4, 2019

Turning Device Concepts Into


Viable Low Volume Products
Steve Hodges and Nicholas Chen, Microsoft Research

A
t a time when the technology industry is viable product. The challenge of this bottleneck, its
embracing powerful new algorithms and root causes, and the potential benefits of overcoming
cloud computing, continued innovation in it are the subject of this column.
hardware is essential. In addition to the growing stor-
age and computation requirements of data centers INTRODUCING THE LONG TAIL
and edge computers, hardware devices provide the Before examining the challenges of creating a via-
critical gateway through which our systems receive ble interactive or embedded hardware product, it is
input and provide output. Whether it is intentional insightful to understand how to characterize the suc-
user interaction, continuous context sensing, situated cess of different products within a market. A common
information display, environmental monitoring, or approach is to plot a graph of the sales volume of each
industrial control, we are more dependent on inter- different product in that market (on the y-axis) against
active and embedded hardware products than ever. product rank (on the x-axis). This is called a rank fre-
Indeed, as the Internet of Things grows, many predict quency distribution. Zipf's law 1 tells us that this dis-
a dramatic growth in both the number and type of tribution often follows an inverse power law, as illus-
such devices. A key factor in this growth is the ability trated in Figure 1. Such a distribution can be split into
of those working in hardware to develop innovative two parts: the “long tail” to the right represents a large
devices with new forms and functions. number of niche (sometimes called boutique or cus-
Hardware development can be split into two tom) items, each of which is sold in relatively small
phases: first, a period of ideation, prototyping and quantities; whereas the “head” at the left contains
design iteration leads to new device concepts; and just a few very popular items (the blockbusters), each
then fruitful concepts transition beyond the basic of which is sold in large volumes.
prototype. The latter phase typically involves creating Market dynamics—factors like customer demand,
hundreds or thousands of copies of a prototype— availability of supply, pricing, and competition—affect
either preproduction evaluation samples or a fully not only the total quantity of products sold but also
fledged low-volume product. The hardware device the shape of the distribution. In some markets, the
research community and the industry it serves have tail is particularly heavy, meaning that in aggregate it
developed many tools and techniques to aid in the amounts to a lot of units. In other markets, the tail is
ideation, prototyping, and design iteration phase truncated. A good example of a truncated market is
mentioned above. However, based on our first-hand the traditional movie industry. Here, there is a virtu-
experience coupled with the observation of others, ous cycle of positive feedback where established film
we frequently see a bottleneck in the subsequent studios with prearranged global theatre distribution
phase—the transition from a working prototype to a produce blockbusters almost as a matter of course.
This generates large revenues to invest in future
productions that are also likely to be successful—a
Digital Object Identifier 10.1109/MPRV.2019.2947966 process that economists call preferential attach-
Date of current version 21 January 2020 ment. However, at the other end of the spectrum

8 July 2021 Published by the IEEE Computer Society  2469-7087/21 © 2021 IEEE
SPECIAL ISSUE SPOTLIGHT

would-be niche film producers struggle to find any


outlet for their films, creating a sharp cut-off in the
rank-frequency distribution.

TECHNOLOGY SHAPES THE TAIL


In microeconomic theory, it is recognized that tech-
nology affects the dynamics in a market.2 For exam-
ple, the growth of internet search and online shop-
ping has given rise to new ways for consumers to
discover and access products. In the case of down-
loadable digital products, such as e-books, music,
and movies, this has significantly changed the shape
of the rank frequency distribution. In these markets,
more of the niche products in the long tail are now sell-
ing because consumers can more easily discover and FIGURE 1. Plotting a rank-frequency distribution often dem-
obtain them. For example, Anderson describes how onstrate an inverse power law relationship with its character-
the now-defunct movie rental company Blockbuster istic short head and long tail.1
historically reported that about 90% of in-store movie
rentals were new releases, whereas only 30% of Netf-
lix rentals were new releases because Netflix custom- up-front investment in server infrastructure, again
ers predominantly rent a large variety of back cata- lowering the barrier of entry to newcomers and allow-
log movies.3 Similarly, there are more sales of long-tail ing new ideas to be trialed quickly and easily. Many
books online than in real stores. For example, Barnes cloud computing providers readily support dynamic
& Noble found that long-tail titles represented just 1.7 scaling and geographical redistribution should a soft-
percent of its in-store sales, but the same titles took 10 ware product or service prove successful.
percent of its online sales.3 In the case of mobile software, all the technologies
Just as technological development has introduced on the previous page combine for even greater effect.
new product marketing and delivery mechanisms, it New products can be developed more quickly and
has also eased product creation. In the case of movies, easily than ever before, the services that power them
the development of affordable digital cinematography can be deployed with little up-front expense, and the
cameras and PC-based video editing have dramatically “app store” marketing and distribution model provides
lowered the barrier to entry for aspiring filmmakers. a channel to millions if not billions of potential users.
Another example is the software market: since Even if a product only attracts hundreds of users a
the turn of the century, technological progress in year, it can still deliver useful revenue for the producer,
software development has had a dramatic effect effectively adding weight to the long tail and increas-
on the dynamics in this market. Development tools ing customer choice along the way.
have become easier to use and cheaper to obtain, While the above examples of emerging long-tail
while agile, open-source development processes, markets are all based on products that can be deliv-
platforms, and communities that enable collabora- ered digitally, it is worth noting that technological
tion have become firmly established. As a result, an developments have enabled a tail for physical goods
app can now be written by a relative newcomer to the too.3 Amazon and Alibaba's e-commerce platforms
industry—perhaps someone who primarily wants to are the most visible examples of how marketplaces
address a personal need. that combine online search, a large customer base,
Another technological development that has digital payment processing, and a fulfillment infra-
helped to enable many software products is cloud structure have changed the face of retail for physical
computing. The ready availability of cloud services goods. Companies like Etsy take a similar approach to
removes the requirement for a company to make an enable sales of low volume boutique goods.

www.computer.org/computingedge 9
SPECIAL ISSUE SPOTLIGHT

HARDWARE DESIGN CONTINUES manner of interactive and embedded devices.5 Even


TO GET EASIER high-school students can design and build useful and
The last two decades of innovation in software design innovative hardware by combining an off-the-shelf
tools, services, and processes have been mirrored in microcontroller board, some external components,
the hardware industry. Powerful and well-documented and a 3-D-printed enclosure. If current trends hold,
hardware design tools have been developed. These are newcomers will be able to get started even more easily
easy to use and install—and in some cases even run in and will be able to build more sophisticated devices,
a web browser, e.g., Upverter. Entry cost has fallen and while experienced developers will be able to work
fully featured design tools such as Autodesk's Fusion more productively.
360 are now available on a monthly subscription, while
others are free. At the same time, online communities CROWDFUNDING AND
relating to design such as Electrical Engineering Stack INCUBATORS MITIGATE
Exchange have become established, providing a way UP-FRONT COSTS
to resolve design questions and troubleshoot issues. Of course, as mentioned in the introduction, the design
The physical prototyping process for hardware has and prototyping phase is not the only challenge in cre-
also become more accessible. On the electronics side, ating a hardware product—a working prototype is just
off-the-shelf boards from micro:bit to Raspberry Pi and the start. The next obstacle in hardware development
plug-together hardware platforms such as .NET Gad- is the need for up-front capital investment in materials
geteer,4 Seeed's Grove system, and MikroElektronika's and customized manufacturing equipment (tooling).
Click boards allow an initial prototype to be pulled Another 21st-century phenomenon—crowdfund-
together in an afternoon. When more refinement is ing—helps to address this. Websites such as Kick-
needed, readily available ICs and electronic modules starter and Indiegogo combine a prepayment mecha-
increasingly abstract away underlying complexity. nism with a storefront akin to that of online retailers
Custom printed circuit boards (PCBs) are inexpensive and app stores. In this way, a hardware developer can
and quick to source, and companies such as Cir- receive monies a year or more ahead of product deliv-
cuitHub and Seeed Studio provide an online service to ery, easing the management of development costs and
support the necessary PCB assembly. Sophisticated mitigating the up-front costs associated with capital
hardware simulation and modeling tools are available, equipment and raw materials.
and some—such as the LTSpice electronic circuit Crowd Supply is a crowd-funding organization
simulator—are free. In terms of mechanical prototyp- that exclusively targets niche hardware products for
ing, improvements in rapid prototyping equipment and both amateur and professional electronics develop-
services mean that laser cutting, three-dimensional ers. As such, the profile of most of their customers is
(3-D) printing, and computer-controlled machining are similar to the profile of the product creators. Crowd
less expensive and more readily available than ever.5 Supply maintains close involvement with each prod-
In addition, new technologies are continually uct team: in addition to facilitating up-front payment
being introduced to further accelerate electronics via its crowd funding portal, the company provides
development. For example, the recently published know-how and experience, plus access to a network of
AutoFritz electronics computer-aided design system6 trusted partners to maximize the chances of success
provides a kind of “auto complete” for electronic cir- for the projects it agrees to support.
cuit design. It presents the designer with a list of sug- Start-up incubators also provide hands-on support
gested components and circuit configurations based and mentoring, often coupled with venture capital (VC)
on the software's analysis of circuits from thousands investment—all in return for a stake in the start-up.
of electronic component datasheets and existing Shenzhen-based Hax and Silicon Valley's Lemnos Labs
open-source electronic designs. and Highway 1 focus on hardware product incubation,
Collectively, these on-going innovations in the drawing on their hardware expertise and contacts to
hardware development space mean that nonexpert minimize the chance of missteps. Hardware Club is a
individuals and organizations can prototype all community-based venture firm whose members share

10 ComputingEdge July 2021


SPECIAL ISSUE SPOTLIGHT

experience, knowledge, and contacts in order to move provides a second example of the difficulty of moving
more quickly while simultaneously reducing risk. from prototype to product. TriggerTrap's first hard-
It is worth noting that incubators typically pursue ware offering was based on an Arduino prototype
products with high growth potential—things that will and resulted in a successful Kickstarter campaign.
quickly move out of the long tail. Companies who want However, they experienced difficulties sourcing
to avoid the pressure that often follows VC invest- enough of the displays used in their prototype to meet
ment and grow a new business more organically can a production volume of nearly one thousand units.
employ the services of an external design service or The part was no longer available and TriggerTrap had
consultancy in order to access product development to convince the display manufacturer to instigate a
expertise. Companies such as Dragon Innovation and special low-volume production run before they could
PCH International specialize in enabling the prototype fulfil their orders.10 TriggerTrap's second hardware
to production transition for electronic products. product—the Ada—also resulted in success on Kick-
starter, raising £290,000. However, the company was
BUT HARDWARE IS STILL HARD unable to transition from their prototype and failed
The collective benefits of online storefronts, accessi- to deliver any Ada products. Although they brought in
ble and powerful design tools, crowdfunding, incuba- expertise from external consultancies, they still made
tors, consultancies, and next-day delivery networks costly mistakes and the consultancy fees were an
all reduce cost and mitigate risk for those seeking to additional drain on their resources.11
bring a new hardware product to market. But evidence Central Standard Timing and TriggerTrap both
suggests that they are often not enough. The flip-side failed due to difficulties navigating the transition from
of preferential attachment is that nascent devices prototype to product. They leveraged many of the
often face a vicious circle. To be successful they must mechanisms previously described—such as powerful
combine significant utility with compelling user expe- design tools, online storefronts, crowdfunding and
rience, while simultaneously being robust and reli- experienced professional design, and manufacturing
able in operation. Meeting these goals requires a large partners—but nonetheless they still underestimated
design and engineering investment, both for the prod- the cost and complexity of transitioning from a refined
uct itself and for its manufacturing process—and that prototype to a product that could be manufactured in
is hard to justify before a product is successful. As a volumes of hundreds to thousands.
result, there are many instances where new consumer Of course, an experienced team with a track record
hardware products fail. of hardware product development is already well
One example comes from Central Standard Tim- versed in the transition from prototype to product.
ing, a two-person start-up that designed the world's But even then, it is still possible to underestimate the
thinnest watch. Based on a sophisticated working pro- scale of the challenges involved. Our final example
totype, Central Standard Timing had tremendous suc- comes from SenseCam, which started as a wearable
cess on Kickstarter—they raised over a million dollars camera research project12 before being productized by
from backers who paid either $99 or $129 for a watch. In an established device manufacturer. Despite the com-
moving from prototype to product, they chose to part- pany's experience with hardware manufacture, they
ner with one of the world's most experienced electron- ultimately found the vicious circle too difficult to over-
ics manufacturing partners. But ultimately, they were come. The first and second versions of the SenseCam
unable to create a reliable production process—less product (the Revue and Autographer, respectively)
than ten thousand units was a small volume for their successfully sold in modest volumes to researchers,
manufacturer, and ultimately the per-unit cost of the clinicians, and enthusiasts. But as the product design
watch was rumored to be $260.9 As a result, Central evolved on a trajectory toward a compelling and com-
Standard Timing were not able to deliver the product petitively priced consumer product, it became clear
to their backers and ultimately ceased operations. that an investment of tens of millions of dollars was
TriggerTrap, a company that manufactured devices necessary to reach sufficient economies of scale.13
to allow SLR cameras to be triggered externally, This level of investment was ultimately not justified

www.computer.org/computingedge 11
SPECIAL ISSUE SPOTLIGHT

given the risk inherent in a new product category such second, many of these activities are unfamiliar to
as a wearable stills camera, and production ceased. those steeped in the software-side of technology.
The replication challenge does not only apply
THE REPLICATION CHALLENGE to high production volumes—in fact as volumes
We believe that many of the difficulties in creating a increase beyond ten thousand units a year many
new hardware product, as encountered in the exam- well-established manufacturing processes that lever-
ples above, stem from a fundamental challenge. Unlike age economies of scale become viable, so the cost of
digital products which can be replicated in a sim- the above activities is more easily absorbed. Instead,
ple way requiring almost no resource and resulting in replication is particularly challenging at lower volumes.
perfect copies, the process of replicating a physical For consumer products, the difficulties typically start
device is complex and incurs cost, and no-matter how at around one hundred pieces per year when the same
much is spent on manufacturing, the copies are subtly ad-hoc craft production techniques used to make
different. We call this “the replication challenge.” prototypes are no longer sufficient. A compounding
Compared to a smartphone app that can be factor with low volume manufacturing is its natural
released to an audience of millions of people when reliance on batch production, which introduces the
development and feature testing are complete, scal- further challenge of periodically reinstigating the
ing a hardware device from “I have one that works” to entire manufacturing process and supply chain.
“anyone can buy one”—i.e., transitioning from a work- As a result, our sense is that it is increasingly rare
ing prototype to a viable product—is much harder. for low volume consumer devices to be viable in the
Although this difference between software and hard- market. While Zipf's Law predicts a long tail of demand
ware productization is easy to describe, the number for niche hardware, the economics of production con-
and complexity of steps required to take a device to strain the economic viability of such products, and the
production is much harder to comprehend until expe- tail is truncated. As a result, consumer choice is limited
rienced first-hand. Essential activities associated with to a relatively small number of high-volume devices.
the replication challenge8 include: These are typically made by large companies who can
justify the sufficient resource required to bring them
›› finding reliable suppliers for all components and to market and sustain them, and often only when they
materials; amplify or otherwise complement an existing product
›› accommodating component tolerances; line.7 In this environment, the recent successes in the
›› designing and building the necessary tooling; interactive and embedded hardware space include
›› building an efficient and reliable manufacturing the well-known smartwatches and voice assistants
process; from major companies. These have created enough
›› controlling and accommodating manufacturing momentum in the market to transition from vicious
variability; to virtuous positive feedback and generate enough
›› selecting and managing manufacturing revenue to warrant on-going refinement.
partners;
›› instigating and maintaining manufacturing CHARACTERISTICS OF LONG TAIL
quality control; and HARDWARE SUCCESSES
›› adapting to changes in pricing and availability of Of course, there are examples of commercially via-
components and services. ble low volume consumer devices. Armed with a bet-
ter understanding of what is necessary to transform a
These activities are by no means unique to elec- hardware prototype into a low volume product—and
tronic device production—they apply to the produc- some of the pitfalls to look out for—it is interesting to
tion of nearly all physical products. However, they examine some of the characteristics of these success-
are worth highlighting for two reasons: first, many ful products.
of them involve more complexity and cost for elec- Like SenseCam, Circuit Stickers14 started life
tronic devices than for other physical products; and in research and quickly transitioned into a product

12 ComputingEdge July 2021


SPECIAL ISSUE SPOTLIGHT

through the efforts of Chibitronics, a small self-funded the tooling cost of injection molding with its relatively
start-up. From the outset, Chibitronics understood low production volume.11
the importance of reliable and cost-effective sup- Central Standard Timing did not require injec-
ply and manufacturing, recognizing that the design tion molding for its product but faced a different
complexity of manufacturing tooling can out-weigh challenge. In order to deliver one of the thinnest
that of the product itself.15 They had realistic expecta- electronic devices ever produced, the company
tions of production costs and were able to fulfill their needed to use nonstandard electronics assembly
crowd-funding obligations. techniques. Unlike PCB assembly, which is still cost
Subsequent to this, Chibitronics has successfully effective even when scaled down to low volumes, the
established a small range of niche products that sit direct chip-to-flex process required costly tooling
in the long tail. In doing so, the company has started and introduced nonstandard steps in the manufac-
to turn positive feedback to its advantage: it is now turing process, making it error prone and unreliable.
able to amortize investments creating relation- Relying on leading-edge manufacturing technology
ships with suppliers, manufacturing partners, and in this way is particularly risky for start-ups.13 In con-
distributors, across multiple products. Although no trast, the established and well-understood manu-
individual product is manufactured in huge numbers, facturing process for a standard PCB bare board
the aggregate volume across multiple products is product results in few defects and can be readily
large enough to negotiate better pricing and attract transferred between manufacturers, stimulating
more commitment from component suppliers and healthy competition.
manufacturing partners.
Improving efficiency across multiple products, as UNLOCKING THE LONG TAIL:
compared with the efficiency of manufacturing any A CALL TO ACTION
one in isolation, is termed “economy of scope.” While Based on our analysis of some recent successes and
economies of scale are characterized by volume, failures in taking new hardware concepts to market,
economies of scope are efficiencies formed by variety. we do not believe that turning an idea for a new device
The hardware crowd-funding specialist Crowd Supply into a working prototype is a limiting factor in new
also leverages economies of scope by drawing on a product introduction. Instead, we believe that the bot-
specific set of partners to manufacture many of the tleneck is the transition from a working prototype to a
products in its portfolio. In a similar vein, Crowd Sup- viable product. Therefore, we encourage those work-
ply takes advantage of its partnership with Mouser, a ing in the field of device hardware to join us in tack-
large electronic component distributor, to secure reli- ling this transition. Collectively, we would like to work
able and competitively-priced supply. toward three broad goals.
A characteristic of Crowd Supply's wide range of
successful products is that many take the form of a Improved Teaching Materials
“bare board”—a PCB that has components soldered and Education Programs
to it but comes with no enclosure. This is perfect for We need richer learning materials regarding the pro-
Crowd Supply's target audience of hardware devel- ductization process: new ways to share the knowledge
opers and hobbyists. It also avoids the high up-front that today largely resides in the design consultancies
cost often associated with designing and manufac- and large companies with the first-hand experience of
turing tooling for an enclosure, which can be thou- device manufacture. Fortunately, there are already a
sands, if not tens of thousands, of dollars for each few books that cover the topics raised in this paper;
plastic piece. In contrast, TriggerTrap, which needed we encourage those interested to read “The Hardware
an enclosure because the company was targeting a Hacker” by Andrew ‘bunnie’ Huang,15 “Prototype to
different audience, ran into difficulties transitioning Product: A Practical Guide for Getting to Market” by
from the rapid prototyping used to create its pro- Andrew Cohen8 and “IoT hardware from prototype to
totypes to manufacturing processes suitable for a production” by Richard Marshall, Lawrence Archard,
product. Ultimately, the company could not reconcile and Steve Hodges.16

www.computer.org/computingedge 13
SPECIAL ISSUE SPOTLIGHT

We would like to see these books complemented need to amortize up-front development and tooling
by other learning materials. For example, curated costs across fewer units. Similarly, batch manufactur-
virtual tours of device manufacturing facilities would ing will never be as efficient as continuous production
provide valuable insights to those who cannot visit because of the fixed costs associated with changing
in person. We also encourage universities to provide a production line from one product to the next. How-
more coverage of topics relating to the replication ever, we imagine new tools and processes that make
challenge in undergraduate- and graduate-level level better use of economies of scope by amortizing nonre-
courses and in professional development programs. curring costs across multiple products.
Take the current difficulty of manufacturing
Stronger Communities and Tighter high-quality enclosures in low volumes as a spe-
Integration Between Partners cific example. Perhaps this could be addressed by a
We see an opportunity to extend today's established modular approach that combines a standard library
online communities and professional networks in a of injection-molded parts in a novel way to create a
way that allows newcomers to the device hardware finished enclosure. Alternatively, it may be possible
space to engage with each other and with established for designers of new products to reuse pre-existing
players so that they can more easily form the part- injection-molding tooling, an approach that Seeed
nerships that are vital to the delivery of a successful Studio calls “design from manufacture.” Perhaps the
product. same reuse philosophy could be used to reduce tool-
We imagine that these partnerships will increas- ing costs in PCB manufacturing tests: the custom
ingly span the globe. In the short term, we would like test fixture—or jig—typically required for PCB tests
to streamline access to resources in today's leading could be based on standard hardware and software
electronics manufacturing regions. For example, the components.
geographical proximity of capital equipment, skilled Of course, the ideas above are largely speculative.
and unskilled labor, and raw materials in locations They are included simply to illustrate the potential for
such as Shenzhen provides unrivaled economies of innovative manufacturing solutions to address the
scope. Indeed, much of the Shenzhen ecosystem replication challenges.
naturally lends itself to batch production: there are
thousands of small factories specializing in different OUTLOOK
aspects of manufacturing from injection molding to In this paper, we have argued that the innovations
PCB assembly. that have enabled a long tail of products in several
At the same time, we would like to learn from industries can be leveraged to do the same for hard-
existing electronics hubs so that we can share best ware devices. While we see these established innova-
practices. Exchanges like the annual trip the MIT tions as necessary, in the case of hardware, they are
Media Lab organizes to Shenzhen are one example of insufficient. Devices bring additional complexities in
how this might be done. Improved communication and comparison with products that can be distributed dig-
remote collaboration could also help bridge the cul- itally such as apps, books, and movies. One key differ-
tural, geographical, and language barriers. Eventually, ence is the replication challenge, especially at low vol-
we imagine that additional electronics manufacturing umes where economies of scale do not readily apply.
hubs will emerge around the world. It is certainly possible to be successful with a niche
hardware product, in the same way that niche apps,
New Manufacturing Solutions books, and movies have been possible since the incep-
for Small Batches tion of their respective markets. However, as things
Finally, we believe there is an opportunity to develop stand, low-volume manufacturing is hard and requires
new hardware manufacturing solutions optimized for tough tradeoffs between complexity, refinement, and
low-volume production, for batch sizes of hundreds price. As a result, it is all too easy to fail. We believe
to thousands of units. Of course, manufacturing in that a sustained focus on the replication challenge can
low volumes will always incur a premium due to the reduce this complexity and risk.

14 ComputingEdge July 2021


SPECIAL ISSUE SPOTLIGHT

Our motivation is simple: we want to change the Jan Kamps, Bolt, San Francisco; Dave Vondle, Cen-
dynamics in the electronic device market to enable a tral Standard Timing, Chicago; Bunnie Huang and
diverse ecosystem of products that do not need to sell Jie Qi, Chibitronics, Singapore; Andrew Seddon, Cir-
in tens or hundreds of thousands of units in order to be cuit Hub, London; Jewel Deng, Coolkit, Shenzhen;
viable. Such cost-effective, low volume, batch manu- Josh Lifton and Darrell Rossman, Crowd Supply, Port-
facturing would benefit many parties across many land; Brooks Vigen, Digikey; Alex Gluhak and Ran
domains. Researchers developing custom devices Katzir, Digital Catapult, London; Gus Issa, GHI Elec-
could deploy them more widely. Start-ups looking to tronics, Detroit; Ji Ke and Mike Reed, Hax, Shen-
grow a sizeable hardware business could get to mar- zhen; Jerry Shi, Itead, Shenzhen; Eric Klein, Lemnos
ket with less risk, giving them headroom for iteration Labs, San Francisco; Liya Du, Microsoft, Shanghai;
in search of product-market fit. Small companies could Anita Rao and Tarun Singh, Microsoft, Redmond; Phil
manage a portfolio of niche, but viable, hardware Eade, Microsoft, Cambridge; Gibson Guo, Zoe He and
products. Large companies could be more agile and Nicolas Schmitt, Microsoft, Shenzhen; MJ Shen, MJ
less conservative, perhaps even trialing innovative Maker, Shenzhen; Zach Fredin, NeuroTinker, Minne-
hardware products to learn first-hand how they fare in apolis; Liam Casey and Alan Cuddihy, PCH Interna-
the market. tional, Shenzhen; Simon Randall, Pimloc, London;
We welcome feedback from the research commu- Fraser Forbes and Jonathan Smith, Premier Farnell,
nity on the ideas presented here and encourage others Leeds; Joey Jiang, Ivy Li, Albert Miao, Eric Pan and
to complement our ideas by considering how their work Shuyang Zhou, Seeed Studio, Shenzhen; Nick Bolton,
might support the growth of long-tail hardware. We Vicon, Oxford. They would also like to thank Oliver
will also continue to engage in dialogue with practitio- Amft, James Devine, Rushil Khurana, Michal Moskal,
ners in the device industry. Ultimately, a focus on long and Nilay Patel for comments on earlier drafts of this
tail hardware can overcome the tyranny of positive column and Albrecht Schmidt for his enthusiasm to
feedback that currently constrains innovation, thus see these ideas come together.
creating a greater variety of viable hardware products
that address markets that are currently underserved, REFERENCES
and meeting the world's growing demand for interac- 1. Wikipedia. “Zipf’s law.” Accessed: Nov. 2019. [Online].
tive and embedded devices. Available: https://en.wikipedia.org/wiki/Zipf%27s_law
2. J. M. Perloff, Microeconomics, 8th ed. London, U.K.:
IN MEMORIAM Pearson, 2018.
This article is dedicated to the memory of Gavin Zhao 3. C. Anderson, The Long Tail: How Endless Choice is
who lost his battle with cancer in August 2019. Gavin Creating Unlimited Demand. New York, USA: Hachette
was a manufacturing engineer at electronics man- Books, 2008, ISBN 978-1401309664.
ufacturing company AQS, where he helped a great 4. N. Villar, J. Scott, S. Hodges, K. Hammil, and C. Miller,
many people navigate the difficulties of low volume “NET Gadgeteer: A platform for custom devices,” in
hardware manufacturing in China. In 2017, he was Proc. Pervasive Comput., 2012, pp. 216–233.
awarded an MIT Media Lab Director's Fellowship in 5. S. Hodges, N. Villar, J. Scott, and A. Schmidt, “A new era
recognition of his work opening the Shenzhen eco- for ubicomp development,” IEEE Pervasive Comput.,
system up to others. Many conversations with Gavin vol. 11, no. 1, pp. 5–9, Jan.-Mar. 2012. doi: 10.1109
helped shape our thinking around long tail hardware. /MPRV.2012.1.
6. J.-Y. Lo, et al., “AutoFritz: Autocomplete for prototyping
ACKNOWLEDGMENTS virtual breadboard circuits,” in Proc. CHI Conf. Hum.
The authors would like to thank the many people who Factors Comput. Syst., 2019, Paper 403. doi: 10.1145
have entertained our questions and ideas about elec- /3290605.3300633.
tronics manufacturing over the years, and ultimately 7. F. Manjoo, The Gadget Apocalypse Is Upon Us. New
informed the ideas presented in this paper. Partic- York Times, New York, NY, USA, Dec. 7 2016. [Online].
ular thanks go to: Gavin Zhao, AQS, Shenzhen; Haje Available: https://www.nytimes.com/2016/12/07

www.computer.org/computingedge 15
SPECIAL ISSUE SPOTLIGHT

/technology/personaltech/the-gadget-apocalypse-is https://medium.com/swlh/do-not-apply-if-you-want
-upon-us.html -an-easy-life-403e77a4a38f
8. A. Cohen, Prototype to Product: A Practical Guide 14. S. Hodges, et al., “Circuit stickers: Peel-and-stick
for Getting to Market. Sebastopol, CA, USA: O’Reilly construction of interactive electronic prototypes,” in
Media, Aug. 2015. Proc. SIGCHI Conf. Hum. Factors Comput. Syst., 2014,
9. S. McGlaun, “CST-01 watch project may be dead”, pp. 1743–1746. doi: 10.1145/2556288.2557150.
SlashGear, Jun. 23 2015. [Online]. Available: https: 15. Andrew “bunnie” Huang, “The Hardware Hacker:
//www.slashgear.com/cst-01-watch-project-may-be Adventures in Making and Breaking Hardware”, 2017.
-dead-23390137/ 16. R. Marshall, L. Archard, and S. Hodges, IoT hardware
10. H. J. Kamps, “Hardware is Hard: Getting a Kickstarter from prototype to production, 2019. [Online]. Available:
project out the door”, Medium Article, Jan. 22, 2015. https://aka.ms/proto-to-product
[Online]. Available: https://medium.com/triggertrap
-playbook/hardware-is-hard-getting-a-kickstarter
-project-shipped-59c9596bdd7f STEVE HODGES is a senior principal researcher at Micro-
11. H. J. Kamps, “How Triggertrap’s $500k Kickstarter soft, where he builds new embedded and interactive systems
campaign crashed and burned”, Medium Article, Mar. 2, and devices. He received a PhD in computer vision and robot-
2015. [Online]. Available: https://medium.com/@Haje ics from Cambridge University. Contact him at: shodges
/how-a-half-million-dollar-kickstarter-project-can @microsoft.com.
-crash-and-burn-5482d7d33ee1
12. S. Hodges, et al., “SenseCam: A retrospective memory NICHOLAS CHEN is a senior program manager at Microsoft,
aid,” UbiComp, 2006, pp. 177–193. where he is building the hardware ecosystem for Azure
13. S. Randall, “Hacking the consumer electronics hard- Sphere. He received his PhD from the University of Maryland
ware start-up,” Medium, Sep. 2018. [Online]. Available: at College Park. Contact him at: nchen@microsoft.com.

IEEE COMPUTER SOCIETY


Call for Papers
Write for the IEEE Computer
Society’s authoritative
computing publications
and conferences.

GET PUBLISHED
www.computer.org/cfp

16 ComputingEdge July 2021


PURPOSE: The IEEE Computer Society is the world’s largest EXECUTIVE COMMITTEE
association of computing professionals and is the leading provider President: Forrest Shull
of technical information in the field. President-Elect: William D. Gropp
MEMBERSHIP: Members receive the monthly magazine Past President: Leila De Floriani
Computer, discounts, and opportunities to serve (all activities First VP: Riccardo Mariani; Second VP: Fabrizio Lombardi
are led by volunteer members). Membership is open to all IEEE Secretary: Ramalatha Marimuthu; Treasurer: David Lomet
members, affiliate society members, and others interested in the VP, Membership & Geographic Activities: Andre Oboler
computer field. VP, Professional & Educational Activities: Hironori Washizaki
VP, Publications: M. Brian Blake
COMPUTER SOCIETY WEBSITE: www.computer.org
VP, Standards Activities: Riccardo Mariani
OMBUDSMAN: Direct unresolved complaints to VP, Technical & Conference Activities: Grace Lewis
ombudsman@computer.org. 2021–2022 IEEE Division VIII Director: Christina M. Schober
CHAPTERS: Regular and student chapters worldwide provide the 2020-2021 IEEE Division V Director: Thomas M. Conte
opportunity to interact with colleagues, hear technical experts, 2021 IEEE Division V Director-Elect: Cecilia Metra
and serve the local professional community.
AVAILABLE INFORMATION: To check membership status, report BOARD OF GOVERNORS
an address change, or obtain more information on any of the Term Expiring 2021: M. Brian Blake, Fred Douglis,
following, email Customer Service at help@computer.org or call Carlos E. Jimenez-Gomez, Ramalatha Marimuthu,
+1 714 821 8380 (international) or our toll-free number, Erik Jan Marinissen, Kunio Uchiyama
+1 800 272 6657 (US): Term Expiring 2022: Nils Aschenbruck,
• Membership applications Ernesto Cuadros‐Vargas, David S. Ebert, Grace Lewis,
• Publications catalog Hironori Washizaki, Stefano Zanero
• Draft standards and order forms Term Expiring 2023: Jyotika Athavale, Terry Benzel,
• Technical committee list Takako Hashimoto, Irene Pazos Viana, Annette Reilly,
• Technical committee application Deborah Silver
• Chapter start-up procedures
• Student scholarship information EXECUTIVE STAFF
• Volunteer leaders/staff directory
Executive Director: Melissa A. Russell
• IEEE senior member grade application (requires 10 years
Director, Governance & Associate Executive Director:
practice and significant performance in five of those 10)
Anne Marie Kelly
Director, Conference Operations: Silvia Ceballos
PUBLICATIONS AND ACTIVITIES
Director, Finance & Accounting: Sunny Hwang
Computer: The flagship publication of the IEEE Computer Society, Director, Information Technology & Services: Sumit Kacker
Computer publishes peer-reviewed technical content that covers Director, Marketing & Sales: Michelle Tubb
all aspects of computer science, computer engineering, Director, Membership & Education: Eric Berkowitz
technology, and applications.
Periodicals: The society publishes 12 magazines and 17 journals.
Refer to membership application or request information as noted
COMPUTER SOCIETY OFFICES
above. Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C.
20036-4928; Phone: +1 202 371 0101; Fax: +1 202 728 9614;
Conference Proceedings & Books: Conference Publishing
Email: help@computer.org
Services publishes more than 275 titles every year.
Los Alamitos: 10662 Los Vaqueros Cir., Los Alamitos, CA 90720;
Standards Working Groups: More than 150 groups produce IEEE Phone: +1 714 821 8380; Email: help@computer.org
standards used throughout the world.
Technical Committees: TCs provide professional interaction in MEMBERSHIP & PUBLICATION ORDERS
more than 30 technical areas and directly influence computer Phone: +1 800 678 4333; Fax: +1 714 821 4641;
engineering conferences and publications. Email: help@computer.org

Conferences/Education: The society holds about 200 conferences


each year and sponsors many educational activities, including IEEE BOARD OF DIRECTORS
computing science accreditation. President: Susan K. “Kathy” Land
Certifications: The society offers three software developer President-Elect: K.J. Ray Liu
credentials. For more information, visit Past President: Toshio Fukuda
www.computer.org/certification. Secretary: Kathleen A. Kramer
Treasurer: Mary Ellen Randall
BOARD OF GOVERNORS MEETING Director & President, IEEE-USA: Katherine J. Duncan Director
& President, Standards Association: James Matthews Director
& VP, Educational Activities: Stephen Phillips Director & VP,
TBD
Membership & Geographic Activities:
Maike Luiken
Director & VP, Publication Services & Products: Lawrence Hall
Director & VP, Technical Activities: Roger U. Fujii
revised 25 May 2021
EDITOR: David Walden, dave@walden-family.com
This article originally
appeared in
DEPARTMENT: ANECDOTES
vol. 42, no. 2, 2020

Learning From Prototypes


Zbigniew Stachniak, York University

C
omputer hardware development often involves hardware, the scope of the demonstration, nor the
a succession of hardware prototypes. These reaction of the audience to the breakthrough concept
prototypes are often discarded once their of the portable computer for personal use. Another
functionality is tested, performance measured, and question that could not be fully answered before the
their faults detected and analyzed. Occasionally, resurfacing of the prototypes was how uncertainty in
functional prototypes are used for a short while the company's decision making impacted its shaping
for demonstration purposes during products' prean- and marketing of personal computing. In this article, I
nouncements or unveiling to attract the attention of describe how the analysis of the MCM/70 prototypes
investors and technology commentators. And this is allowed to answer these questions more fully.
where the life cycle of prototyping typically ends.
Fortunately, some computer prototypes survive EARLY MCM/70 PROTOTYPES
and end up in museums where they are preserved for MCM built several prototypes of the MCM/70 before
research as they may still hide the seeds of the suc- the computer's manufacturing began in mid-1974.
cess or failure of both the final products and the firms All of them have their roots in the Key-Cassette con-
that embarked on constructing them, of technologi- cept developed by the company's co-founder and
cal breakthroughs and paradigm shifts that were yet first president Mers Kutt. A drawing of it can be found
to come. in design notes that Kutt kept from late 1971 until
York University Computer Museum in Toronto has mid-1974 (see Figure 1). The one-page sketch depicted
several prototypes of the MCM/70 microcomputer, a portable computing device with built-in keyboard,
which was possibly the earliest computer mass one-line display, cassette storage, and acoustic cou-
manufactured for personal use. The MCM/70 was pler with built-in modem for communication over
designed by a Toronto-based electronics company phone lines. In addition, the Key-Cassette was to be
Micro Computer Machines (MCM) in the early 1970s. programmed in the APL language. The Key-Cassette
I have written about the MCM/70 before.1 Yet, some concept showed several key aspects of personal com-
key questions concerning the computer's design and puting philosophy that MCM would be developing in
introduction to the market remained unanswered until the coming years—an individual-focused complete
additional prototypes of the computer were acquired computing environment that was easy to learn and
by the museum and analyzed. interact with.
The computer was publicly demonstrated for The first attempt at implementing the core
the first time during the APL V conference held in Key-Cassette features was a single-board computer
Toronto on May 15–18, 1973. Before the arrival of the put together by MCM's chief hardware engineer Jose
prototypes at the museum, little was known about this Laraya in mid-1972. His computer utilized an Intel
historic presentation. Occasional remarks about the SIM8-01 simulation board which the semiconduc-
demo buried in oral histories gathered by the museum tor company offered to electronics engineers for
describe with confidence neither the demonstrated experimentation with its novel microprocessor and
Eprom devices. Although the Sim8-01 architecture
was inadequate to achieve MCM's design objectives,
Digital Object Identifier 10.1109/MAHC.2020.2987408 this first prototype confirmed that building a versatile
Date of current version 29 May 2020. microprocessor-based computer was feasible.2

18 July 2021 Published by the IEEE Computer Society  2469-7087/21 © 2021 IEEE
ANECDOTES

FIGURE 1. Drawing of the Key-Cassette by M. Kutt (1972). Source: York University Computer Museum.

Not much is known about the next, rack-mounted MCM built the first functional MCM/70 demon-
engineering prototype constructed by Laraya and his strator in early 1973, in time for the computer's public
team soon after the SIM8-01-based prototype was presentation in May during the APL V conference in
declared a dead end. It was sufficiently advanced to be Toronto. The unveiling of the MCM computer at the
demonstrated to shareholders as a proof of concept conference was a landmark event in the history of
on November 11, 1972. personal computing because it showed for the first
At the end of 1972, the main design issue faced by time that a practical, portable, general-purpose com-
the company was an insufficiency of memory: the Intel puter designed for personal use and programmed in
8008 microprocessor at the heart of the computer a high-level language could be economically manu-
could directly address only 16KB of memory while the factured.3 Unfortunately, not much is known about
APL interpreter alone called for much more than that. that demonstration. Only a brief statement about the
Furthermore, the MCM engineers had to find a way showing of “the first stand-alone APL microcomputer
to “compact” prototype's rack-mounted hardware to which elicited a great deal of interest” can be found
fit it into a small enclosure planned for the portable in L.B. Moore's conference report published in APL
personal computer. Quote-Quad.4 Furthermore, none of the former MCM
employees interviewed by me could describe the
PC DEMONSTRATED demonstrated hardware or software with confidence.
From the early stages of the MCM/70 design process, That changed in 2017 when York University Computer
MCM used the computer's prototypes as demonstra- Museum obtained one of the MCM/70's prototypes
tors. In April 1972, in his corporate notes, Kutt expressed and a portfolio of early MCM/70 design documents.
with some urgency the need to develop a demonstra- When analyzed, these objects helped not only to iden-
tor by early June 1972. Under the heading “Shortcut tify the demonstrated prototype but also to determine,
to Demo,” he considered packing a power supply and in general terms, the presentation's content.
a printed circuit board (PCB) with some MCM/70 cir- Among the donated documents, there are two
cuitry on it into a standard desktop calculator case to drawings of PCB layouts. The first of these drawings
have something to show to the potential investors. In is dated May 9, 1973, and titled “MCM 70 PROTOTYPE.”
the end, MCM came up only with a cardboard mockup The second drawing, dated June 26, 1973, has refer-
which, as it turned out, sufficed to secure venture ence to neither a prototype name nor a revision ver-
capital from a law firm in downtown Toronto. sion. Both drawings define single-board computers,

www.computer.org/computingedge 19
ANECDOTES

From the published dimensions of the wide-case proto-


type and those found on the drawing, it is evident that
the PCB depicted in the drawing would fit perfectly
into the prototype's case. Furthermore, the types,
locations, and dimensions of the keyboard, numeric
keypad, plasma display, and switches (as shown in Fig-
ure 2) match the PCB's layout exactly. Therefore, the
wide-case prototype was most likely the single-board
computer defined by the June 26th documentation. It
was built around the Intel 8008 CPU and was equipped
with 2KB of RAM and 10KB of ROM which contained,
among other software, an interpreter of a dialect of
FIGURE 2. Wide-case prototype of the MCM/70. MCM APL—the MCM/APL.
promotional photograph (1973). Source: York University Having the hardware identity of the demonstrated
Computer Museum. computer established, we can turn our attention to
the question of the demonstration's content. In a 2003
interview, Gord Ramer, who implemented the MCM/
i.e., computers whose main circuitry reside on a APL for the MCM/70 computer recollected that “The
single board. It is highly likely that the computer dem- demo [computer] had almost the complete APL imple-
onstrated by MCM at the APL V conference was the mentation. There were still bugs to be avoided […] We
so-called “wide-case prototype” that the company did not have a special demo version of the software,
extensively used for promotional purposes in 1973 so the demo was tightly controlled, i.e., the person on
(depicted in Figure 2), and that the computer's hard- the keyboard new what to avoid.”6 APL programming
ware was defined by the June 26th documentation. language offers a range of built-in functions and MCM
Here is why—some early documents sent by MCM to most certainly demonstrated the capabilities of its
its shareholders stated that several MCM/70s were computer by executing programs involving some of
constructed and ready for field trials in early May them. But which ones? Early MCM/70 promotional
(hence, before the APL V conference), and that by documentation frequently included computer code
August, MCM had built ten wide-case machines “for comparisons to demonstrate the efficiency of coding
marketing test purposes.” One of these documents in APL as opposed to programming in languages such
also includes an image which depicts exactly the as Fortran and Basic. Computing the average of a set
same computer as the wide-case prototype shown in of numbers (APL code (+/X)÷ X ← ) and sorting a set
Figure 2. 5 of numbers (APL code X[ X ← ]) where given as exam-
Because of MCM's limited manufacturing capabili- ples. But these programs would be considered rather
ties and the fact that the design and manufacturing of elementary by an APL programmer who, instead,
the wide-case prototype's case took considerable would rather see examples involving APL functions
time, the production of the ten prototypes would have whose evaluation required considerably more time—
had to begin before May. It is therefore reasonable to functions such as matrix inverse which was frequently
conclude that the MCM computers available in May used for benchmarking. Unfortunately, the low speed
were the first of the ten destined for field trials in of the Intel 8008 processor inside the MCM/70 dem-
August. Hence, what MCM demonstrated during the onstrator meant that, most likely, MCM demonstrated
APL V conference was one of the wide-case proto- programs with short execution times and only those
types available in early May. that could be directly entered via keyboard. Indeed,
To establish the hardware makeup of the demon- the demonstration of long multiple-line APL programs
strated MCM computer, I compared the June 26th would require a transfer of such programs from exter-
PCB drawing with the published specifications of the nal storage into the computer's memory. In a prean-
wide-case prototype and with its image (see Figure 2). nouncement document released in May 1973, MCM

20 ComputingEdge July 2021


ANECDOTES

listed an external cassette unit as an available option.


In principle, such a unit could have been interfaced
with the prototype via the computer's communication
bus called Omniport. However, it is doubtful that such
cassette storage was available for the wide-case pro-
totype at the time of its presentation in Toronto. The
computer could only be equipped with up to 2 KB of
RAM and that was not enough to support an external
cassette unit and to provide enough memory for the
storage and execution of user's applications.7 In the
end, the announced cassette unit did not materialize
as a commercial product. Instead, MCM offered three
production models of its MCM/70 computer: a model
without cassette storage and with 2 KB of RAM (as in
the wide-case prototype) and two models with built-in
cassette drives—a single cassette model with 4 KB of
RAM and a two-cassette model with 8 KB of RAM (see
Figure 4).
Scarce primary sources detailing the presenta-
tion make it difficult to ascertain the APL commu-
nity's response to the demo and to MCM's concept
of a personal APL computer. According to Moore's
above-quoted statement, the MCM/70's presentation FIGURE 3. This photograph of Ted Edwards demonstrat-
was met with interest. In a 2001 interview, Mers Kutt ing the Executive during the APL Congress in Copenhagen
made a similar comment noting that the computer appeared in Politiken on August 23, 1973. Source: York
astounded a group of IBM employees attending the University Computer Museum.
conference. In fact, two of the first dozen MCM/70
units manufactured by MCM went to IBM's General
Systems Division in Atlanta, Georgia, for the purpose evaluation of the expression in question, which was
of “research and analysis.” In 1975, IBM announced its very slow in comparison with the state-of-the-art IBM
own APL desktop computer—the IBM 5100.8 However, mainframes running APL. It is plausible that similar
other MCM employees assisting with the presenta- requests were made during the MCM/70's demonstra-
tion recollected a less enthusiastic response from tion and that the slow speed of the computer elicited
the audience who did not give the MCM/70 computer similar reactions to those recalled by Tuttle. Indeed, a
too much serious thought. Joey Tuttle, a former IBM request to evaluate an expression such as 0.7÷ 255 to
employee and a member of the IBM 5100 development generate consecutive 255 integers and to divide each
team, recalled a similar presentation of the IBM 5100 of the numbers by 0.7 could easily have resulted in a
at IBM Rochester. During the presentation, “one of the snicker as it would have taken the machine approxi-
attendees shouted out, “run +/40000 1”” which would mately 50s to evaluate it while the execution of the
create an array of length 40 000 filled with 1s and to same code on an IBM System 360 mainframe would
return the sum of all the elements stored in the array— have produced the output in a fraction of that time.
a simple way to test memory. When the presenter “Such audiences can judge harshly,” concluded Tuttle.
entered the expression and the computer seemed
frozen for an extended period of time, “the anticipa- EXECUTIVE—THE MISSING LINK
tion and the increasingly nervous body language of In the summer of 1973, several MCM/70 demonstra-
the presenter, turned to laughter.”9 In the end, the tors were on their European and North American pro-
demonstrated IBM 5100 took over 3 min to finish the motional tours. Most were the wide-case prototypes.

www.computer.org/computingedge 21
ANECDOTES

on his lap. Several experts who went by thought that


the computer was a joke. Many stated that such a
machine was impossible. But others who followed Ted
Edwards’ programming computations […] admitted
that the machine performed exactly as considerably
larger IBM computers running APL and connected to
an electrical outlet. There just was not any power cord
attached to Ted Edwards’ briefcase.”10
A look inside the Executive's briefcase enclosure
gives the impression that the computer's hardware
was packed in a rush using, what would be best
described as a “chain saw and duct tape” approach.11
The computer's keyboard had been crudely sawn-off
from the wide-case prototype's main board. Other
FIGURE 4. Two-cassette MCM/70 (model 708). Source: York components were attached using means ranging
University Computer Museum. from nuts and bolts to sticky tape. The large ROM
board consisting of 88 Intel 1702A Eproms that barely
fit inside the case was placed at the bottom and, it
But one was an altogether different piece of hard- seems, was kept in place only by means of the numer-
ware, assembled in record short time for a demon- ous wires pressing against it. The built-in cassette
stration at the APL Congress that was to take place drive allowed for loading and storing APL programs
in August at the Technical University of Denmark in and data. However crudely built, the analysis of the
Lyngby, north of Copenhagen, Denmark. In July 1973, Executive revealed much about the evolution of
MCM decided to pack the current MCM/70 hardware, the MCM/70 concept. The single-board approach
including a keyboard, a one-line plasma display (Bur- employed in the wide-case prototype was replaced by
roughs SelfScan), and a single cassette drive, into a modular architecture in which computer hardware
an attaché case and to operate all of it on batter- was logically divided into interconnected individual
ies exclusively. The company expected considerable modules such as CPU, ROM, RAM, and interface mod-
marketing gains from the planned ground-breaking ules that occupied separate circuit boards and com-
presentation of a never-seen-before luggable, bat- municated over a common bus. The Executive's CPU
tery operated, general-purpose computer which they and cassette interface boards were early versions of
named the Executive. the boards that would eventually populate the pro-
The gamble played off. On August 23, the day duction model of the computer. On the other hand,
after the Executive's demonstration, the Danish the RAM board (4 KB) was, possibly, the one developed
daily Politiken published a front-page article about earlier for the rack mounted prototype and would be
a sensational computer from Canada. The article redesigned for the production model. Finally, the large
included two photographs depicting MCM employee ROM board inside the Executive was the same as the
Ted Edwards operating the Executive on the door- one used in the early production models. Because in
step of the auditorium where the conference took early 1974, ROMs containing MCM/70's systems soft-
place (see Figure 3). “In all modesty, a real sensation ware were not yet delivered by the supplier (Electronic
occurred yesterday when the International APL Con- Arrays), the first MCM computers were equipped with
gress was about to begin at the Technical University the same ROM board found in the Executive and,
of Denmark.” wrote Politiken. “When the buses with because of its large size, it was mounted externally
conference participants from 24 countries arrived under the bottom of the computer's case (thus earn-
from hotels in Copenhagen, he [Edwards] was sitting ing it a nick-name “pregnant bottom”). This shows
on the steps of an auditorium building solving com- that from the hardware architecture point of view,
plex problems on his data processing machine placed the Executive was almost identical to the production

22 ComputingEdge July 2021


ANECDOTES

model and, hence, that by July 1973, the company had


already abandoned the single-board approach repre-
sented by the wide-case prototype.
For a brief time, MCM contemplated manufactur-
ing the Executive and made announcements to that
effect in the press. In October 1973, the computer was
shown during the National Computer Show and Con-
ference in Toronto but, in the end, the company quietly
abandoned the Executive concept. The surviving MCM
corporate documents do not provide any justification
for the decision. However, some arguments against
the Executive can be reconstructed by analyzing its
design and another prototype put together by Edwards
some years later. To begin with, the Executive was an
attempt at building a fully luggable, battery-operated,
personal data processing system. It was to offer com-
plete data processing and communication functional-
ity at the user's fingertips. However, most if not all of
the Executive's features were planned for the MCM/70
desktop which, in addition, was not much larger or FIGURE 5. Ted Edwards’ Executive-E. Source: York University
heavier than the Executive. Like the Executive, it could Computer Museum.
be operated on batteries and carried around in an
elegant leather case that could be purchased for $150
from MCM. left for anything at all, not even an internal fan, which
Most likely, there were also arguments of a tech- brings us to the second issue—heat dissipation. The
nical nature against the Executive. Some of these Executive's case had no provisions to dissipate heat
arguments can be deduced from the Executive-like during the computer's operations. In the MCM/70 pro-
computer designed and built by Edwards around duction model, which also lacked an internal fan, the
1975–1976 (see Figure 5; I will refer to this computer heat dissipation problem was solved by packaging all
as the Executive-E.).12 From a hardware point of view, the boards in special aluminum casings sandwiched
the Executive-E is an MCM/70 clone. All the PCB together to form the back end of the computer and to
boards used in it are the same as those found in the act as a giant heat sink. In the Executive-E, Edwards
production model of the MCM/70 or its MCM/700 used the entire aluminum case of the computer as a
refinement. However, from a packaging perspective, hit sink.
it is the Executive repackaged into an all-aluminum It is likely that the Executive-E was an attempt by
case. The addition of the second cassette drive may Edwards at salvaging the Executive concept. Because
suggest that one of the issues with the Executive was of its sturdy packaging it could have been marketed
its limited memory and, as a consequence, limited as a luggable data collection and processing system
functionality. While the Executive used its single cas- for use in harsh rugged environments. However, by
sette drive for external storage, the amount of RAM the time its design was finished, Edwards was no
that could be made available to a user remained low. longer with MCM. It would be left to another com-
MCM solved the insufficient RAM problem by develop- pany to build and successfully introduce a portable
ing a cassette-based virtual memory system (called battery-operated computer for rugged environments.
AVS) that made over 100 KB of memory available to GRiD Systems, Inc., introduced its first laptop–the
applications. But AVS required a dedicated cassette GRiD Compas 1001–in 1981. In the following years,
drive and there was simply no space left in the Execu- several GRiD laptops would find their way into space
tive's case for the second drive. There was no space supporting NASA's early Shuttle missions.13

www.computer.org/computingedge 23
ANECDOTES

MARKETING they part of a marketing ploy to overwhelm potential


PERSONAL COMPUTING customers and MCM shareholders with claims of its
With the MCM/70 personal computer concept, MCM offering's sophistication and completeness, an early
hoped to create a lucrative niche on the electronics example of vaporware? The analysis of the surviving
market between the inexpensive, easy-to-use desktop MCM hardware and corporate documents shows that
electronic calculators that were inadequate for many all of these concerns were the case.
data processing tasks, and large, expensive, and com- In late 1973, MCM dropped the preprogrammed
plex to operate general-purpose computers. To suc- ROMs option all together, gave up on memory exten-
ceed, the company needed to support its personal sion to 64KB, replaced the built-in printer option
computing venture with a well-defined and appealing (which had never materialized) with an external impact
product philosophy and attractive marketing to pro- printer. But not all of the company's claims were a
mote it. MCM promotional documents from the mid– marketing gambit. The Executive's hardware already
1973 paint an interesting picture of how the company featured a partially implemented communications bus
was stitching together a personal computing para- (Omniport) that allowed the computer, in principle, to
digm from the computer's basic features as well as its interface with printers.15 However, what the company
hardware and software options. An August 24, 1973 did not have at that time was the printer itself, and
portfolio of MCM/70 preannouncement documents it was not until mid-1975 when, finally, it offered its
distributed to MCM shareholders already contained MCP-132 printer (the Diablo HyType I printer). At that
an outline of the paradigm. time, MCM also upgraded the MCM/70 with an EAI
communications interface that allowed the computer
The revolutionary concept of the MCM/70 is that to communicate with a range of other peripherals.
it brings to the world of computing what the $100 MCM's stated objective “to offer a complete micro
hand held calculator brought to the world of computer system” was finally realized.16
calculating. [It is] of a size, price, and ease-of-use The MCM/70's built-in display (Burroughs Self-
as to bring personal computer ownership to Scan) was one of the core features of the all-in-one
business, education, and scientific users previ- hardware concept. While such a display enhanced
ously un-served by the computer industry.14 portability, the single-line 32-character-long solu-
tion adopted for the computer offered a convenient
But that's not all. The portfolio also listed the display environment for only rudimentary APL calcu-
MCM/70's basic features together with available lations. MCM maintained that MCM/70's display was
options. The list was a very long one: two types of sufficient for many tasks because of APL's coding
printers (one external and one built into the comput- efficiency. For all other applications, there was to
er's chassis), cassette drives, serial communications be a CRT display, already listed in August 1973 as an
interface, CRT (Cathode Ray Tube) display, RAM expan- available option. Of course, the company could have
sion of up to 64 KB, and even plug-in ROM modules equipped the MCM/70 with a multiple-line display, as
with preprogrammed applications software. These was done for some calculators of the era, if it were not
features and options were designed to capture the for the fact that the computer required a dedicated
core features of the personal computing environment segment of RAM for storing characters to be displayed
that MCM wanted to offer with its desktop. However, (display memory). More display lines would take away
throughout 1973 and 1974, the list of the MCM/70's precious RAM from the user's work space. The RAM
available options was a moving target, continuously shortage was so severe that display memory was also
revised with some options added, others dropped used for temporary storage during computations. A
to reappear again. Were these changes reflective of first-time user would have been quite surprised and
uncertainty in company's decision-making or of an astounded when after entering a command, such as
evolving point of view on personal computing that the above mentioned 0.7 ÷ 255, the computer would
necessitated the shifting of priorities for the devel- begin a 50-second-long display of strange and dazzling
opment of at least some of these options? Or were patterns (i.e., visual representations of temporal data

24 ComputingEdge July 2021


ANECDOTES

stored in display memory) before eventually clearing wanted to draw attention to a new computing para-
everything and showing the result of the computa- digm and to create its own unique identity.
tion. Therefore, having a single line display built-in and In his 1965 article “The Great Gizmo,” Reyner Ban-
an external CRT terminal as an option seemed like a ham characterized a gizmo as
reasonable solution. But the CRT option disappeared
from MCM's 1974 promotional literature and was not […] a small self-contained unit of high performance
discussed (as a work in progress) in any surviving min- in relation to its size and cost, whose function
utes from MCM managers’ meetings. It would not be is to transform some undifferentiated set of
until 1976 that MCM finally introduced such a display circumstances to a condition nearer human
for its new computer—the MCM/800. This might sug- desires. The minimum of skills is required in its
gest that the announcement of a CRT display as an installation and use, and it is independent of any
“available” option made three years earlier was, to put physical or social infrastructure beyond that
it mildly, a careless instance of the company “snowing” by which it may be ordered from a catalogue
customers and shareholders with options that were and delivered to its prospective user.17
only meant to enhance the MCM/70's image. Or is it?
To answer this question, I analyzed the ROM boards As early as the MCM/70's prototyping stage, the
inside the MCM/70, Executive-E, and MCM/800 company's description of the computer provided
computers. The inspection of these boards showed an almost undeviating instance of Banham's char-
that the same three ROM sockets (out of 16) were left acterization of a gizmo. The Key-Cassette concept
unpopulated in the MCM/70's and the Executive-E was a gizmo (although only on paper), and so was the
while similar boards inside the MCM/800s had all Executive. The design of the wide-case prototype
16 ROM chips installed. It turns out that these three accomplished not only the requirement of hosting
empty sockets were reserved for correcting and future all the necessary hardware in a single box but also of
expansion of the MCM/70's systems software, includ- finding the right balance between stylish eye-catching
ing the addition of CRT support. One may therefore design, functionality, and practicality. Two years of
conclude that financial or other corporate difficulties design experiments culminated in the 1974-release
that MCM experienced in 1974 forced the company to of the MCM/70's production model which inherited
drop several options, including an inexpensive printer the all-in-one concept from the Key-Cassette and
and a CRT display, in order to concentrate on the the Executive, and a defining stylish design from the
MCM/70's prompt introduction to the market. How- wide-case prototype. In the late 1970s, the nascent
ever, as evident from the MCM/70's ROM board, some home computer industry would follow in the footsteps
necessary hardware provisions for such options were of MCM choosing appealing, dashing designs over the
made at the start. industrial look of minicomputers.

LOOK OF A GADGET REFERENCES


The MCM/70 concept was shaped by ideas coming 1. See Z. Stachniak, Inventing the PC: The MCM/70 Story,
from several sources, one of which was the calcula- McGill-Queen’s University Press, 2011, and Z. Stach-
tor industry. From the late 1960s, desktop programma- niak, MCM on Personal Software, IEEE Ann. History
ble calculators were presented as minicomputers and Comput., vol. 39, no. 1, pp. 29–51, 2017.
even as minis for personal use, as was the case with 2. For more information on this prototype, see Z. Stach-
the Olivetti Programma 101 introduced in 1965. Fur- niak, “SIM8-01: A proto PC,” IEEE Ann. History Comput.,
thermore, the manufacturers of hand-held calcula- vol. 29, no. 1, pp. 34–48, 2007.
tors marketed their devices as consumer electronics 3. Three months earlier, a French company Réalisa-
gizmos. The MCM/70 was to be both; a stylish “gizmo” tions Études Électroniques (R2E) announced its
look was regarded just as important a feature of the microprocessor-based Micral (see, Bui, R. Un minior-
MCM/70 as its conception for personal use. Through dinateur pour moins de 8500FF, zero.un.informatique
the industrial design of the MCM/70 the company hebdo, no. 228, Feb. 12, 1973, pp. 1 and 5.). However, the

www.computer.org/computingedge 25
ANECDOTES

Micral was not intended to be a personal computer: 11. The Executive was donated to York University
“MICRAL’s principal use is in process control. It does Computer Museum in 2017.
not aim to be an universal mini-computer,” Micral 12. The date codes found on its ICs, suggest that the
User’s Manual, R2E, Jan. 1974, p. 66. computer was put together around 1976. Because
4. L.B. Moore, A report of APL V Conference, APL Edwards left MCM at the end of 1975, he continued the
Quote-Quad, Jun. 1973, pp. 20–21. design after leaving MCM.
5. The documents in question are dated May 4 and Aug. 13. Accessed on: Mar. 2020. [Online]. Available: https:
24, 1973. York University Computer Museum, MCM //airandspace.si.edu/node/35305
Collection. 14. MCM/70 pre-announcement shareholder documents,
6. Author interview with Gord Ramer, Jan. 15, 2003. Aug. 24, 1973. York University Computer Museum,
7. A large portion of the computer’s 2 KB of RAM was MCM collection.
used for display, APL execution stack, and a variety of 15. This was confirmed using the MCM/70 emulator
tables required by the computer’s operating system. developed at York University Computer Museum and
Interfacing a cassette drive with a computer would which uses almost identical systems software to that
require an allocation of additional RAM to store found in the Executive’s ROMs.
information about the interfaced device and the tape’s 16. MCM Newsletter, no. 1, 1976, pp. 2 and 3. The MCP-132
content leaving little space for anything else. printer plotter was sold by MCM for $4500 which was
8. I have encountered no evidence for the design of the almost the same price as the MCM/70 in its basic
IBM 5100 being, in any way, influenced by the MCM/70. configuration ($4970).
9. J. Tuttle, private communication, Jan. 2020. 17. R. Banham, The Great Gizmo, Ind. Des., vol. 12, pp.
10. Politiken, Aug. 23, 1973, pp. 1 and 20. 48–59, 1965.

ADVERTISER INFORMATION

Advertising Coordinator Central US, Northwest US, Southeast US, Asia/Pacific:


Eric Kincaid
Debbie Sims Email: e.kincaid@computer.org
Email: dsims@computer.org Phone: +1 214-553-8513 | Fax: +1 888-886-8599
Phone: +1 714-816-2138 | Fax: +1 714-821-4010 Cell: +1 214-673-3742

Midwest US:
Advertising Sales Contacts Dave Jones
Email: djones@computer.org
Mid-Atlantic US: Phone: +1 708-442-5633 Fax: +1 888-886-8599
Dawn Scoda Cell: +1 708-624-9901
Email: dscoda@computer.org
Phone: +1 732-772-0160
Cell: +1 732-685-6068 | Fax: +1 732-772-0164 Jobs Board (West Coast and Asia), Classified Line Ads

Southwest US, California: Heather Bounadies


Mike Hughes Email: hbuonadies@computer.org
Email: mikehughes@computer.org Phone: +1 623-233-6575
Cell: +1 805-208-5882

Northeast, Europe, the Middle East and Africa: Jobs Board (East Coast and Europe), SE Radio Podcast
David Schissler
Email: d.schissler@computer.org Marie Thompson
Phone: +1 508-394-4026 Email: marie.thompson@computer.org
Phone: +1 714-813-5094

26 ComputingEdge July 2021


IEEE
Computer
Society Has
You Covered!
WORLD-CLASS CONFERENCES — Stay
ahead of the curve by attending one of our
215+ globally recognized conferences.

DIGITAL LIBRARY — Easily access over 800k


articles covering world-class peer-reviewed
content in the IEEE Computer Society
Digital Library.

CALLS FOR PAPERS — Discover


opportunities to write and present your
ground-breaking accomplishments.

EDUCATION — Strengthen your resume


with the IEEE Computer Society Course
Catalog and its range of offerings.

ADVANCE YOUR CAREER — Search the


new positions posted in the IEEE Computer
Society Jobs Board.

NETWORK — Make connections that count


by participating in local Region, Section,
and Chapter activities.

Explore all of the member benefits


at www.computer.org today!
DEPARTMENT: EXPERT OPINION This article originally
appeared in

Monolithically Integrated RRAM-


and CMOS-Based In-Memory
vol. 39, no. 6, 2019

Computing Optimizations for


Efficient Deep Learning
Shihui Yin, Arizona State University
Yulhwa Kim, Pohang University of Science and Technology
Xu Han and Hugh Barnaby, Arizona State University
Shimeng Yu and Yandong Luo, Georgia Institute of Technology
Wangxin He, Arizona State University
Xiaoyu Sun, Georgia Institute of Technology
Jae-Joon Kim, Pohang University of Science and Technology
Jae-sun Seo, Arizona State University

Resistive RAM (RRAM) has been presented as a promising memory technology toward deep
neural network (DNN) hardware design, with nonvolatility, high density, high ON/OFF ratio,
and compatibility with logic process. However, prior RRAM works for DNNs have shown
limitations on parallelism for in-memory computing, array efficiency with large peripheral
circuits, multilevel analog operation, and demonstration of monolithic integration. In this
article, we propose circuit-/device-level optimizations to improve the energy and density of
RRAM-based in-memory computing architectures. We report experimental results based
on prototype chip design of 128 × 64 RRAM arrays and CMOS peripheral circuits, where
RRAM devices are monolithically integrated in a commercial 90-nm CMOS technology. We
demonstrate the CMOS peripheral circuit optimization using input-splitting scheme and
investigate the implication of higher low resistance state on energy efficiency and robustness.
Employing the proposed techniques, we demonstrate RRAM-based in-memory computing
with up to 116.0 TOPS/W energy efficiency and 84.2% CIFAR-10 accuracy. Furthermore, we
investigate four-level programming with single RRAM device, and report the system-level
performance and DNN accuracy results using circuit-level benchmark simulator NeuroSim.

D
eep learning algorithms have shown tre- conventional memory technologies (e.g., CMOS scal-
mendous success in recent years1 for vari- ing) for hardware accelerator designs.2
ous applications including computer vision, To bridge this gap and largely improve the
speech recognition, language translation, etc. memory energy efficiency, in-memory computing
However, an increasing gap exists between the (IMC) has been proposed in recent years across
exponential network size growth of state-of-the-art different memory technologies. 3–9 IMC typically
DNNs (e.g., tens of millions of parameters) and the asserts multiple or all rows simultaneously to perform
incremental energy-efficiency improvement of multiply-and-accumulate (MAC) computations of
DNNs inside the memory, e.g., along the bitlines with
analog current/voltage.
Digital Object Identifier 10.1109/MM.2019.2943047 SRAM-based IMC works3–5 demonstrate high-
Date of current version 8 November 2019. energy efficiency, however typically such IMC SRAM

28 July 2021 Published by the IEEE Computer Society  2469-7087/21 © 2021 IEEE
EXPERT OPINION

bitcells include a few additional transistors, which was employed at the RRAM array periphery, degrad-
degrades density and leakage. In addition, custom ing array efficiency and energy consumption. In the
peripheral circuits such as analog-to-digital convert- article by Shulaker et al.,10 a monolithically integrated
ers (ADCs) incur lower array efficiency. Since one 3-D nanosystem has been presented, which connects
SRAM cell occupies 150–300 F2 (F is the feature size CMOS transistors, carbon nanotube transistors
of a technology node), on-chip SRAMs cannot hold all (CNFET), and RRAM devices in different layers with
weights of DNNs. Therefore, CMOS hardware acceler- inter-layer vias. A small-scale support vector machine
ators inevitably involve off-chip DRAMs at the system accelerator has been demonstrated, but applicabil-
level, which results in high energy consumption. ity for larger DNNs has not been shown. While there
Consequently, a number of works have proposed to has been considerable improvement in the CNFET
bring computation closer to the DRAM. DRAM-based
near-memory computing proposes to add logic in the
DRAM die, however logic capability in the optimized BOTH SRAM AND DRAM ARE VOLATILE
DRAM process is relatively limited. On the other hand, AND HAVE INCREASING CONCERNS
DRAM-based IMC is more challenging, because the ON LEAKAGE POWER IN SCALED
conventional 1T1C DRAM read is destructive, and thus CMOS NODES. TO THAT END, RESISTIVE
requires additional overheads such as data copy and NONVOLATILE MEMORY (NVM) HAS
write back.6 DRAM cell designs with nondestructive EMERGED AS A GOOD ALTERNATIVE
read have been proposed (e.g., 2T1C, 3T1C),7 but they DUE TO HIGH DENSITY, NONVOLATILITY,
directly degrade density, which is especially disadvan- AND NONDESTRUCTIVE READ. AMONG
tageous for area-efficient DRAMs. SEVERAL WELL-KNOWN CANDIDATES
In addition, both SRAM and DRAM are volatile INCLUDING PHASE CHANGE MEMORY
and have increasing concerns on leakage power in (PCM), RESISTIVE RAM (RRAM), AND
scaled CMOS nodes. To that end, resistive nonvolatile MAG- NETIC RAM (MRAM), THIS ARTICLE
memory (NVM) has emerged as a good alternative FOCUSES ON RRAM OWING TO ITS
due to high density, nonvolatility, and nondestructive HIGH ON/OFF RATIO, MULTILEVEL
read. Among several well-known candidates including PROGRAMMABILITY, AND MONOLITHIC
INTEGRATION CAPABILITY.
phase change memory (PCM), resistive RAM (RRAM),
and magnetic RAM (MRAM), this article focuses on
RRAM owing to its high ON/OFF ratio, multilevel pro-
grammability, and monolithic integration capability. integration with CMOS or RRAM, in terms of manufac-
There has been only a few works that have demon- turability and yield, integration of RRAM with CMOS in
strated monolithically integrated RRAM and CMOS for commercial technology is much superior.11
DNN hardware design.8–10 In this article, we address such limitations in
Mochida et al.8 designed 180-nm and 40-nm pro- RRAM-based IMC toward energy-/area-efficient and
totype chips with embedded RRAM arrays. However, accurate DNN hardware design, using monolithic
only simple multilayer percepton (MLP) has been dem- integration of RRAM and CMOS. In particular, we
onstrated that resulted in low-inference accuracy of investigate three different device/circuit techniques:
90.8% for MNIST data set. An RRAM macrointegrated 1) modulating resistance values for binary RRAM
with multilevel sense amplifiers (SAs) in 55-nm CMOS devices; 2) peripheral circuit minimization with
logic process was recently reported by Xue et al.,9 input-splitting technique; and 3) multilevel RRAM pro-
targeting convolutional neural networks (CNNs). How- gramming. We report measurement results of 90-nm
ever, a relatively low CNN accuracy of 81.83% accuracy CMOS prototype chip in monolithically integrated
for CIFAR-10 data set was achieved with binary/ter- RRAM arrays, which executes IMC operations of
nary precision. Moreover, only nine WLs are asserted CNNs for CIFAR-10 data set.
simultaneously in the 256 × 512 subarray, which limits In our IMC architecture, monolithic integration
further parallelism, and a relatively complex 4-bit ADC of RRAM and CMOS is crucial, since we need dense

www.computer.org/computingedge 29
EXPERT OPINION

FIGURE 1. Prototype chip design with monolithically integrated RRAM and 90-nm CMOS technology14 (adapted with permis-
sion). This work presents further energy/area optimization.

connections to all wordlines (WLs) and bitlines of decoder has two modes of operation: 1) turning on all
the RRAM array. If RRAM and CMOS are not mono- WL signals simultaneously for binary or low-precision
lithically integrated (e.g., using through-silicon vias or MAC operation; or 2) generating one-hot WL signals
silicon interposers), the bitline and WL delays will be for cell-level programming. As shown in Figure 1(d),
excessive and the integration density will be too low. ADCs and column multiplexers consume a large por-
Furthermore, monolithic integration of RRAM with tion of the core area. In this article, further energy/
CMOS is simpler and less expensive than that with area optimization is investigated including periph-
CNT.10 RRAM process is CMOS fabrication compat- eral circuit minimization by using higher LRS and
ible, with just a few layers of oxide deposition at the input-splitting scheme.
contact via at back-end-of-line (BEOL) compatible Conventional binary RRAMs cannot effectively rep-
temperature. Typically, only one additional mask/ resent the positive and negative weight values (+1 and
lithography is required, allowing RRAM integration to –1) in binarized neural networks (BNNs),12 because the
be low cost. high-resistance state (HRS) and low-resistance state
(LRS) values of binary RRAM devices are both posi-
RRAM PROTOTYPE CHIP DESIGN tive. In addition, as shown in Figure 2, the activation/
We designed a prototype chip for RRAM-based robust weight value combinations of +1/+1 and –1/–1 should
IMC with Winbond's embedded RRAM technology,11 result in the same effective resistance. To that end, we
which monolithically integrates 90-nm CMOS and proposed to use a “XNOR-RRAM” bitcell design13,14 for
RRAM between M1 and M2 [see Figure 1(a)]. Figure 1(b) BNNs. As shown in Figure 2, the XNOR-RRAM bitcell
shows the pad-limited chip micrograph and the core is designed with differential RRAM cells and differ-
area of the chip. As shown in the top-level block dia- ential WLs. The binary activations are implemented
gram in Figure 1(c), the chip design includes a 128 × with the differential WLs, and the binary weights are
64 1T1R array, row decoder, level shifter, eight 8-to-1 implemented with the HRS/LRS values of XNOR-RRAM
column multiplexers, eight 3-bit flash ADCs based bitcells. With all differential WLs asserted simultane-
on seven voltage-mode SAs, and two 64-to-1 column ously, all cells in the same column in parallel compute
decoders for RRAM cell-level programming. The row the binary MAC operations. Since one XNOR-RRAM

30 ComputingEdge July 2021


EXPERT OPINION

FIGURE 2. IMC operation of XNOR-RRAM14 (adapted with permission).

cell consists of two 1T1R bitcells, 128 × 64 1T1R array Considering that tightly spaced reference voltages
effectively represents 64 × 64 XNOR-RRAM cells. make flash ADCs more susceptible to variability at low
Both the preliminary simulation results13 and ini- voltages, we show that the proposed input-splitting
tial measurement results14 of the XNOR-RRAM design scheme actually results in much improved accuracy at
only considered the default LRS and HRS values for the lower supplies.
binary RRAM devices, and employed a 3-bit ADC at the Finally, beyond binary RRAM devices, we inves-
periphery for digitizing the analog partial MAC value. In tigate four-level programming with the same RRAM
this article, we investigate three further optimizations devices in our prototype chip, and experimentally
in monolithically integrated RRAM devices and periph- validate the density, energy, and performance gains by
eral circuits, toward enhancing the energy efficiency benchmarking a CNN for CIFAR-10 data set.
and density of the RRAM-based IMC systems.
First, since the default LRS value (~6 k ) consumes HIGHER RESISTANCE FOR
large current and the ON/OFF ratio is relatively high LRS DEVICES
(~150), we explore using higher LRS values (e.g., ~12 In binary RRAM devices, only two states per device
and ~24 k ) to evaluate the tradeoff between current exist, namely LRS (high conductance) and HRS (low
reduction, ON/OFF ratio, and CNN accuracy. conductance). In commercial RRAM technologies that
Second, although a 3-bit ADC is relatively simple, are typically used for storage applications, ON/OFF
it still consumes a large area compared to the RRAM ratio of higher than 100 has been reported. Having a
array itself, resulting in low-array efficiency. We large ON/OFF ratio is certainly good, but on the other
present further algorithm/hardware improvements hand, having high conductance value for the LRS leads
beyond the previous input-splitting techniques,15 and to high current consumption.
employ binary SAs with an unified reference voltage To that end, for a given HRS value fixed, and if we
across all columns, instead of ADCs at the RRAM array have higher LRS values in binary RRAM devices, then
periphery, for digitizing the analog partial MAC values. the current and energy consumption could be largely

www.computer.org/computingedge 31
EXPERT OPINION

FIGURE 3. New input-splitting scheme that allows unified reference voltage for all SAs in the RRAM array periphery.

reduced. On the other hand, compared to the default threshold values. Batch normalization conducts scal-
LRS, targeting LRS to have a higher resistance value ing and shifting operation, and the shifting operation
can result in wider distribution after programming generates threshold values. Therefore, as illustrated
or more susceptible to nonideal effects such as read in Figure 3, we removed batch normalization before
disturb. In addition, and if the LRS and HRS ranges output binarization of small layers. Instead, we experi-
become relatively close, it will adversely affect the mentally found a proper scaling factor for prebinariza-
DNN accuracy for the RRAM-based IMC hardware. tion values of small layers. For the RRAM array with 64
rows, we found that, by scaling prebinarization value
PERIPHERAL CIRCUIT with 1/20, most of scaled values lie in the range of [–1,
MINIMIZATION WITH INPUT- 1]. As there is no shifting operation on prebinarization
SPLITTING SCHEME value of small layers, the columnwise threshold is fixed
Input splitting is a method of the BNN architecture to 0. Then, we added batch normalization after the
design for ADC-free IMC.15 Input splitting recon- merge to compensate for the loss of batch normaliza-
structs a large BNN layer with a network of small lay- tion on small layers.
ers. It splits input of a large layer so that the number of We tested a VGG-like CNN for CIFAR-10 data-
inputs per split group is less than or equal to row count set, which has the network structure of input-
of the given RRAM array. Each split group constructs a 128C3-128C3-MP2-256C3-256C3-MP2-512C3-512C3-
new small layer, and the binary output generated from MP2-1024FC-1024FC-10FC.12 Here, 128C3-128C3 refers
small layers is accumulated and subsequently bina- to the convolution layer with 128 input feature maps, 3
rized with a threshold value of zero. Then, each layer of × 3 kernels, and 128 output feature maps, MP2 refers to
input-split BNN can fit on RRAM array so that the array 2 × 2 max-pooling, and 1024FC refers to the fully con-
can generate binary neuron values as output values. nected layer with 1024 hidden neurons.
However, batch normalization governs that each neu- As we used RRAM arrays with 64 effective rows,
ron has its own threshold value, which necessitates the input counts per input-split BNN layer was set to
each column to have a digital-to-analog converter,4 63 for convolution layers and 64 for fully connected
adding a large overhead. layers. We used 63 for convolution layer because we
In this article, we modified the conventional use 3 × 3 kernel for convolution, and 63 is the clos-
input-splitting method15 to eliminate columnwise est value less than equal to 64. In addition, to make

32 ComputingEdge July 2021


EXPERT OPINION

FIGURE 4. Conductance distribution is shown for four levels of RRAM device programming. Both measurement data from proto-
type chip and fitted Gaussian distribution curves are shown.

the input of convolution layer be divided by 63, we percentage of the RRAM cells that are outside the
changed the number of channels to be an integer mul- target conductance ranges were 0.32%, 1.32%, 0.92%,
tiple of 7. Using Torch, we trained the input-split BNN and 0.44%, respectively.
with the same training condition used in conventional
input splitting.15 For comparison, we trained baseline Inference Accuracy Simulation
BNN (nonsplit BNN), input-split BNN with columnwise The inference accuracy for a CNN is simulated with the
threshold, and input-split BNN without columnwise measured 2-bit RRAM data. However, considering the
threshold. The algorithm simulation results showed limited measurement data (4096 data points for each
that the input-split BNN without columnwise thresh- state) compared to the total number of parameters
old model has compatible accuracy (86.64%) with in a CNN, we first fitted the probability density func-
the baseline BNN (88.46%) and input-split BNN with tion (PDF) of the measured conductance data with a
columnwise threshold (88.24%). linear combination of multiple Gaussians as the fitted
PDF. Then, the conductance values were generated
MULTILEVEL RRAM DEVICES with the fitted PDF for a large CNN. Figure 4 shows the
PDF of the measured conductance and the conduc-
Multilevel Programming Scheme tance values generated with fitted PDF. The distribu-
To achieve 2-bit RRAM, two more conductance states tion tails of the experiment data are captured with the
are inserted between minimum and maximum con- fitted PDF.
ductance levels so that the conductance interval is Using 2-bit weights and 4-bit activations, we
equal between adjacent states. A write–verify pro- benchmarked the same VGG-like CNN for CIFAR-10.
gramming scheme is iterated until less than 2% of It is assumed that each 2-bit weight is stored into one
RRAM cells are outside the target conductance range RRAM cell. We first trained the CNN with the quan-
for each of the four levels. The maximum number of tized training method proposed by Wu et al.,16 and
write–verify iterations to program one RRAM cell is obtained the software baseline accuracy of 91.7%. The
specified as Nmax . For each conductance state, 4096 2-bit weights are then mapped to conductance states,
RRAM cells in the prototype chip are programmed where the conductance values of each RRAM cell are
and measured. It is observed that the conductance generated with the fitted PDFs of the corresponding
distribution becomes more concentrated as Nmax states. The inference accuracy is simulated for three
increases. The Nmax to achieve the target conduc- different array size 64 × 64, 128 × 128, and 256 × 256,
tance range are 15, 30, 15, and 10 for the four conduc- where we employed flash ADCs with 5-bit precision
tance states, respectively. After programming, the using nonlinear quantization.13

www.computer.org/computingedge 33
EXPERT OPINION

FIGURE 5. Measured ADC output results compared with bitcount values from BNN algorithm.

MEASUREMENT AND susceptible to process variation. On the other hand,


SIMULATION RESULTS since the input-splitting scheme allows us to have only
one reference voltage for the SAs, the digitization is
Binary-RRAM-Based IMC Energy inherently more robust to variability and noise.
and Accuracy Characterization with We performed chip measurements for the experi-
Higher LRS and Input Splitting ments of higher LRS values and the input-splitting
We envision that large binary CNNs are mapped onto scheme. For the higher LRS experiment, we pro-
multiple RRAM arrays, where weights for different grammed RRAM devices with different target LRS val-
input channels are stored on different rows, weights ues of 6, 12, and 24 k . For the input-splitting scheme
for different output channels are stored on different experiment, with the same XNOR-RRAM prototype
columns, and weights within each convolution kernel chip, we only use one SA out of the seven SAs that are
(e.g., 9=3 × 3) are stored in different RRAM macros. 3, 14 present in the flash ADC. This means that when we
Subsequently, the partial MAC results from different employ the input-splitting scheme, the overall ADC
RRAM macros are accumulated via digital simulation. area in the RRAM macro is effectively reduced by 7×.
In the article by Yin et al.,14 3-bit ADC was used to dig- In Figure 5, we show the comparison of the bitcount
itize the analog partial MAC values, where seven refer- values from the BNN algorithm (i.e., ideal partial sum
ence voltages for each flash ADC required offset can- values) and the measured ADC output values using
cellation in order to achieve >83% CIFAR-10 accuracy. 12-k\ LRS target, for both the conventional scheme
The new input-splitting scheme presented in this arti- with 3-bit ADCs and the input-splitting scheme with
cle substantially reduces such calibration overhead, binary SAs. As we compare the 1.2- and 0.8-V supply
since we only need binary SAs to digitize the analog results, it can be seen that the ADC output values
partial sum, and the same reference voltages are used become less accurate at 0.8 V. However, with a single
for all 64 columns of the RRAM array. reference level, the input-splitting scheme still main-
Another important challenge for the flash ADC is tains more robust operation even at lower voltages.
that the adjacent reference voltages are very close to As shown in Figure 6, the energy efficiency
each other, especially since the partial sum data distri- (TOPS/W) of RRAM-based IMC increases with higher
bution is concentrated near zero.13 If we lower the sup- LRS values and with lower supply voltages. The
ply voltage, the reference voltages actually become CIFAR-10 accuracy values for the VGG-like CNN with
even closer to each other, which makes it more voltage scaling are reported in Figure 7 with different

34 ComputingEdge July 2021


EXPERT OPINION

LRS values for both the input-splitting scheme with


binary SAs and the conventional scheme with 3-bit
ADCs. For the conventional scheme with ADCs, it
can be seen that the CIFAR-10 accuracy degrades by
a large amount when the supply voltage scales below
the nominal 1.2 V. This is due to the fact that the seven
reference voltages for the flash ADC are separated
only by a small voltage value, which aggravates with
lower supply voltages, incurs more ADC output errors,
and adversely affects the DNN accuracy.
For the input-splitting scheme, there is only one
reference voltage used by all eight SAs for 64 columns;
the SA operation is more robust against voltage FIGURE 6. Energy efficiency with voltage scaling for RRAM
scaling, noise, and variability. As a result, Figure 7 IMC with different LRS values.
shows that high CNN accuracy is
maintained for the input-splitting
scheme for 12-k /24-k LRS val-
ues, down to 0.8-V supply. The
input-splitting scheme also shows
higher accuracy for cases when
RBL voltage is around 0.6–0.7 V
(high gain region for SA with dif-
ferential NMOS input) for bitcount
values near zero, e.g., higher sup-
ply with 6-k LRS and lower supply
with 24-k LRS value.
The conventional scheme14
achieves energy efficiency of
20.8 TOPS/W at 1.2-V supply (see
Figure 6), while achieving 83.5%
accuracy with binary CNN. Jointly FIGURE 7. CIFAR-10 accuracy with voltage scaling for RRAM IMC with different LRS
optimizing the use of higher LRS values and input-splitting scheme.
value of 12 k (24 k ), the proposed
input-splitting scheme effectively
enabled voltage scaling down to 0.8 V without any addi- are a total of eight ADCs in the RRAM array periphery.
tional accuracy loss, improving the energy-efficiency The inference computation is processed layer by layer.
by 3.7× (5.2×), and achieving 80.9 (116.0) TOPS/W. Table 1 presents the benchmarking results with differ-
ent RRAM array sizes.
Two-Bit RRAM-Based CNN First, the inference accuracy drops as the array
Accelerator Performance size is increased, since the ADC precision is fixed at 5
Benchmarking with Neurosim bits. This is attributed to the fact that the partial sum
Two-bit RRAM could further increase the integration distribution becomes broader with larger array size,
density for the CNN accelerator. The performance and, therefore, quantization loss is increased. It should
benchmarking for 2-bit RRAM-based CNN accelera- be noted that the conductance variation of 2-bit RRAM
tor is conducted in NeuroSim,17 where the aforemen- only leads to small accuracy drop when comparing the
tioned VGG-like CNN is utilized. We assume that eight accuracy with ADC quantization only and with both
columns share one ADC in the RRAM array, and there ADC quantization and RRAM conductance variation.

www.computer.org/computingedge 35
EXPERT OPINION

TABLE 1. CNN simulation results with 2-bit RRAM for


different RRAM array sizes. CIFAR-10 data set. Experiments with 2-bit RRAM dem-
RRAM array size 64 64 128 128 256 256
onstrate sufficient separation between four conduc-
91.2% 1 89.2%1 79.0%1
tance levels, and show higher CNN accuracy up to 128
CIFAR-10 accuracy × 128 RRAM array size.
(91.4%) 2 (89.3%) 2 (81.2%)2

Chip area (mm 2 ) 19.64 19.21 14.71


ACKNOWLEDGMENT
Read dynamic energy
33.73 32.50 55.46 The authors would like to thank Winbond Electron-
(layer-by-layer, J)
ics for chip fabrication support. This work was sup-
Leakage energy ( J) 1.78 0.77 0.81
ported in part by NSF-SRC-E2CDA under Contract
Latency (ms) 8.90 6.11 12.93
2018-NC-2762B; by the National Science Founda-
Energy efficiency
17.35 18.52 10.95 tion (NSF) under Grant 1652866, Grant 1715443, and
(TOPS/W)
Grant 1740225; in part by JUMP C-BRIC and ASCENT
Throughput (FPS) 112.38 163.72 77.36
programs (SRC programs sponsored by DARPA); and
1 Accuracy with ADC quantization and RRAM conductance variation.
2 Accuracy with ADC quantization (without RRAM conductance variation). in part by the Nano-Material Technology Develop-
ment Program through the National Research Foun-
dation of Korea funded by the Ministry of Science, ICT
In terms of chip area, 256 × 256 array shows smaller (NRF-2016M3A7B4910249).
chip area compared with 128 × 128 array due to the
increased array efficiency. However, only small chip REFERENCES
area increase is observed when array size is reduced 1. Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,”
to 64 × 64. Comparing with 128 × 128 array, for 256 × Nature, vol. 521, pp. 436–444, 2015.
256 array, chip area is reduced as less subarrays are 2. X. Xu, et al., “Scaling for edge inference of deep neural
needed. It can be explained by the fact that in 64 × 64 networks,” Nature Electron., vol. 1, pp. 216–222, 2018.
array, the periphery circuit size is reduced due to lower 3. Z. Jiang, et al., “XNOR-SRAM: In-memory computing
maximum column partial sum current, therefore, the SRAM macro for binary/ternary deep neural networks,”
array efficiency does not drop significantly compared in Proc. IEEE Symp. VLSI Technol., 2018, pp. 173–174.
with 128 × 128 array. 4. H. Valavi, et al., “A 64-tile 2.4-Mb in-memory-computing
For the read latency and dynamic energy con- CNN accelerator employing charge-domain compute,”
sumption, comparing with 128 × 128 array, 64 × 64 IEEE J. Solid-State Circuits, vol. 54, pp. 1789–1799, Jun.
array needs more partial sum accumulations between 2019.
subarrays, which leads to higher latency and energy 5. X. Si, et al., “A twin-8 T SRAM computation-in-memory
consumption. For 256 × 256 subarray, the large column macro for multiple-bit CNN-based machine learning,” in
current leads to significantly higher ADC energy con- Proc. IEEE Int. Solid-State Circuit Conf., 2019, pp. 396–398.
sumption and, therefore, the overall energy consump- 6. V. Seshadri, et al., “Ambit: In-memory accelerator
tion is increased. Besides, the larger column partial for bulk bitwise operations using commodity DRAM
sum current leads to larger transmission gate (TG) size technology,” in Proc. IEEE/ACM Int. Symp. Microarchit.,
in the multiplexer, which induces higher latency for the 2017, pp. 273–287.
decoder to drive the TG gate capacitor. 7. S. Li, et al., “DRISA: A DRAM-based reconfigurable
in-situ accelerator,” in Proc. IEEE/ACM Int. Symp.
CONCLUSION Microarchit., 2017, pp. 288–301.
In this article, we demonstrated RRAM-based IMC 8. R. Mochida, et al., “A 4 M synapses integrated analog
with 90-nm CMOS prototype chips that monolithically ReRAM based 66.5 TOPS/W neural-network processor
integrated RRAM and CMOS in different vertical lay- with cell current controlled writing and flexible net-
ers. Using device-/circuit-/algorithm-level techniques, work architecture,” in Proc. IEEE Symp. VLSI Technol.,
both the energy efficiency and density of binary 2018, pp. 175–176.
RRAM-based IMC hardware improved substantially, 9. C.-X. Xue, et al., “A 1 Mb multibit ReRAM computing-in-
achieving up to 116.0 TOPS/W and 84.2% accuracy for memory macro with 14.6 ns parallel MAC computing

36 ComputingEdge July 2021


EXPERT OPINION

time for CNN Based AI edge processors,” in Proc. IEEE WANGXIN HE is currently working toward the PhD degree at
Int. Solid-State Circuit Conf., 2019, pp. 388–390. the School of Electrical, Computer and Energy Engineering,
10. M.-M. Shulaker, et al., “Three-dimensional integration Arizona State University. He is a student member of IEEE.
of nanotechnologies for computing and data storage Contact him at: wangxinh@asu.edu.
on a single chip,” Nature, vol. 547, pp. 74–78, 2017.
11. C. Ho, et al., “Integrated HfO2-RRAM to achieve highly XU HAN is currently working toward the PhD degree at the
reliable, greener, faster, cost-effective, and scaled School of Electrical, Computer and Energy Engineering,
devices,” in Proc. IEEE Int. Electron Devices Meeting, Arizona State University. She is a student member of IEEE.
2017, pp. 2.6.1–2.6.4. Contact her at: xhan37@asu.edu.
12. I. Hubara, et al., “Binarized neural networks,” in Proc.
Adv. Neural Inf. Process. Syst., 2016. XIAOYU SUN is currently working toward the PhD degree at
13. X. Sun, et al., “XNOR-RRAM: A scalable and parallel the School of Electrical and Computer Engineering, Georgia
resistive synaptic architecture for binary neural Institute of Technology. He is a student member of IEEE. Con-
networks,” in Proc. Design, Autom. Test Eur. Conf. tact him at: xiaoyusun@gatech.edu.
Exhib., 2018, pp. 1423–1428.
14. S. Yin, et al., “High-throughput in-memory comput- HUGH BARNABY is a professor in the School of Electrical,
ing for binary deep neural networks with mono- Computer and Energy Engineering, Arizona State University.
lithically integrated RRAM and 90 nm CMOS,” 2019, His research interests include device physics and modeling,
arXiv:1909.07514. [Online]. Available: https://arxiv.org microelectronic device/sensor design and manufacturing,
/abs/1909.07514 and analog/RF/mixed-signal circuit design. He is a Fellow of
15. Y. Kim, et al., “Input-splitting of large neural networks IEEE. Contact him at: hbarnaby@asu.edu.
for power-efficient accelerator with resistive crossbar
memory array,” in Proc. IEEE Int. Symp. Low Power JAE-JOON KIM is a professor in the Department of Creative
Electron. Design, 2018, Article no. 41. IT Engineering, Pohang University of Science and Technol-
16. S. Wu, et al., “Training and inference with integers in ogy. His research interests include neuromorphic circuit and
deep neural networks,” 2018, arXiv:1802.04680. [Online]. system, low power VLSI design, and flexible device/circuit
Available: https://arxiv.org/abs/1802.04680 design. He is a member of IEEE. Contact him at: jaejoon
17. P. Chen, et al., “NeuroSim: A circuit-level macro model @postech.ac.kr.
for benchmarking neuro-inspired architectures in online
learning,” IEEE Trans. Comput.-Aided Design Integr. SHIMENG YU is an associate professor in the School of
Circuit Syst., vol. 37, no. 12, pp. 3067–3080, Dec. 2018. Electrical and Computer Engineering, Georgia Institute
of Technology. His research interests are nanoelectronic
devices and circuits for energy-efficient computing systems.
SHIHUI YIN is currently working toward the PhD degree at He was a recipient of the NSF CAREER Award in 2016, the IEEE
the School of Electrical, Computer and Energy Engineering, Electron Devices Society (EDS) Early Career Award in 2017,
Arizona State University. He is a student member of IEEE. and the Semiconductor Research Corporation (SRC) Young
Contact him at: Shihui.Yin@asu.edu. Faculty Award in 2019. He is a senior member of IEEE. Contact
him at: shimeng.yu@ece.gatech.edu.
YANDONG LUO is currently working toward the PhD degree
at the School of Electrical and Computer Engineering, Geor- JAE-SUN SEO is an assistant professor in the School of
gia Institute of Technology. He is a student member of IEEE. Electrical, Computer and Energy Engineering, Arizona State
Contact him at: yandongluo@gatech.edu. University. His research interests include energy-efficient
hardware design for machine learning and neuromorphic
YULHWA KIM is currently working toward the PhD degree at computing. He received the IBM Outstanding Technical
the Department of Creative IT Engineering, Pohang Univer- Achieved Award in 2012 and the NSF CAREER Award in 2017.
sity of Science and Technology. She is a student member of He is a senior member of IEEE. Contact him at: jaesun.seo
IEEE. Contact her at: yulhwa.kim@postech.ac.kr. @asu.edu.

www.computer.org/computingedge 37
EDITOR: Ron Vetter, University of North Carolina Wilmington, vetterr@uncw.edu

This article originally


appeared in
DEPARTMENT: SPOTLIGHT ON TRANSACTIONS
vol. 53, no. 11, 2020

Parallel and Distributed Systems


Manish Parashar, Rutgers University

This installment of Computer’s series highlighting the work published in IEEE Computer
Society journals comes from IEEE Transactions on Parallel and Distributed Systems.

P
arallel and distributed computing systems The solution proposed by the authors thoroughly
have made significant contributions to the optimizes various aspects of the training, including 1)
advancement of machine learning. The recent data compression using run-length encoding, 2) fast
success of machine learning technologies is due not data partitioning using stable sort, 3) approximation
only to new algorithms that improve accuracy but also in finding the split for a node using two-stage histo-
to new algorithms and systems that exploit special- gram building, 4) building histograms that are aware
ized high-performance hardware [for example, graph- of data sparsity, 5) reusing intermediate result during
ics processing units (GPUs) and field-programmable training, and 6) exploiting multiple GPUs to handle
gate arrays] to improve efficiency. This research topic larger data sets. These techniques, taken together,
has been even more important in the era of big data.
Gradient boosting decision trees (GBDTs) have been
widely used in advertising systems, spam filtering,
GRADIENT BOOSTING DECISION
sales prediction, medical data analysis, and image
TREES HAVE BEEN WIDELY USED
labeling. In recent years, they have become very
IN ADVERTISING SYSTEMS, SPAM
popular and won many awards in machine learning
FILTERING, SALES PREDICTION,
and data mining competitions.
MEDICAL DATA ANALYSIS, AND
In “Exploiting GPUs for Efficient Gradient Boost- IMAGE LABELING.
ing Decision Tree Training,”1 Wen et al. present a
series of novel optimization techniques on GPUs
for accelerating GBDT training tenfold over their
CPU counterparts and improving scalability on vastly increase the performance and scalability of
high-dimensional data over their GPU equivalents GBDT training on GPUs and form the critical founda-
(see Figure 1). Accelerating GBDT training on GPUs tions of an open sourced system in GitHub named
is fundamentally challenging due to the large ThunderGBM. Comprehensive experimental results
number of irregular memory accesses required by on popular data sets confirm the effectiveness of
the tree structures and the need for frequent data ThunderGBM over the existing GBDT implementa-
partitioning. tions, including XGBoost, LightGBM, and CatBoost on
both GPUs and CPUs.

Digital Object Identifier 10.1109/MC.2020.3017320


Date of current version: 21 October 2020 A lthough accelerating the efficiency of machine
learning systems on GPUs is not new, irregular

38 July 2021 Published by the IEEE Computer Society  2469-7087/21 © 2021 IEEE
xgboost-cpu catboost-cpu
10 3
lightgbm-cpu thundergbm

10 2
Time Elapsed (s)

2
n/a

n/a

n/a
n/a
0
e

im
s

sy
6

p
yp

in
gg

s2
00

g1
su
-s
vt

hi

lo
e2

al
ne
co

re

FIGURE 1. Comparison with existing libraries on the GPU and CPUs.1

accesses and frequent data partitioning make GBDT MANISH PARASHAR is the Distinguished Professor of
training different and more challenging when com- Computer Science at Rutgers, The State University of New
pared to regular training systems. The authors have Jersey. He is the editor in chief of IEEE Transactions on Paral-
addressed these technical challenges with novel and lel and Distributed. Contact him at parashar@rutgers.edu.
efficient solutions as well as integrated the tech-
niques into an easy-to-use system. The promising
speedup achieved through GPU acceleration can pro-
mote further research on accelerating other machine
learning systems with irregular access patterns (such
as sparse networks). On the other hand, the success
of this project also increases the feasibility of more
real-time applications such, as fraud detections in
future digital finances using GBDTs.

REFERENCE
1. Z. Wen , J. Shi, B. He, J. Chen , K. Ramamohanarao, and
Q. Li, “ Exploiting GPUs for efficient gradient boosting
WWW.COMPUTER.ORG/COMPUTINGEDGE
decision tree training ,” IEEE Trans. Parallel Distrib.
Syst., vol. 30, no. 12 , pp. 2706 –2717, 2019.

www.computer.org/computingedge 39
EDITORS: Phil Laplante, plaplante@psu.edu
Ben Amaba, baamaba@us.ibm.com This article originally
appeared in

DEPARTMENT: INTERNET OF THINGS


vol. 21, no. 4, 2019

To Err is Human, to Forgive, AI


Phil Laplante, Penn State
Ben Amaba, IBM

T
rustworthiness is an elusive quality. We may WHO CAN YOU TRUST?
completely or partially trust relatives, friends, Trust in an entity (either human or a system) is con-
colleagues, or strangers. We also place a great stantly evolving, but there is a base trust established
deal of trust in the operators of airplanes, cars, medi- at first encounter. We all have a certain “trust toler-
cal prognoses, invasive medical devices, and other ance profile” based on individual factors such as
complex systems, potentially risking our lives doing upbringing and life experience. For example, some
so. Similarly, we trust that the designers, builders, people have a very low initial trust tolerance and tend
testers, operators, and maintainers of these com- to distrust people upon the first encounter. Other
plex systems took great care in ensuring safety and people, however, may trust the same person substan-
reliability. But no matter what measures are taken to tially from the outset.
ensure error free operation, we acknowledge a cer- An initial trust level is also established for a
tain level of risk of failure, even catastrophic failure system based on its source, certifications, licenses,
in these systems, because they are built and oper- regulatory guidelines, operating history, and/or on
ated by humans. the user's trust profile. For example, you may not
What about those systems that employ artificial want to be the first person to ride in a newly released
intelligence (AI), such as driverless cars, autopilots, autonomous vehicle but have friends who would
invasive medical devices, and certain types of sys- leap at the chance. Who is right here? To answer, let
tems in the internet of things? Do we expect these us consider the initial encounter with any generic AI
AI enabled systems to operate in such a way that enabled system.
they can be trusted more than those that are oper- During a crisis of faith, while living a monastic life,
ated only by humans? It seems to be headline news mathematician Blaise Pascal used expected value
when an AI capable system fails, particularly when theory to conclude that it was better to believe in a
the blame can be placed directly on the underlying divine being than not. We now call this formulation
“intelligence.” But we should not be surprised when “Pascal's Wager” and a sort of complementary analy-
AI enabled systems fail and we can prove it to you? sis can help us answer the question of whether to
In fact, while we strongly advocate for such systems, trust any AI enabled system upon the first encounter.
we think we should insist on an even higher level Consider the confusion matrix in Figure 1.
of professionalism and rigor when developing and A human can either trust the AI system or not.
deploying AI systems. If the AI system is trustworthy, the consequences
of the interaction are positive. If the human trusts
an untrustworthy AI system, however, then the con-
sequences can be extremely negative (for example,
Digital Object Identifier 10.1109/MITP.2019.2913265 a robotic surgical device making a fatal error). But
Date of current version 17 July 2019. when the human already distrusts the AI system,

40 July 2021 Published by the IEEE Computer Society  2469-7087/21 © 2021 IEEE
INTERNET OF THINGS

FIGURE 1. Confusion matrix for human-AI prisoner’s dilemma problem.

then presumably, precautions would have been taken For both human and AI-enabled system, we are con-
for the consequences of failure, making them less stantly reevaluating our trust in that entity. Should
severe, for example, having some sort of human over- we ever trust any entity completely, even after a
ride mechanism when the system goes awry. Finally, long history of trustworthy interactions? We think
distrusting a trustworthy AI system may have some not. Let us look at a couple of models to justify this
slight cost, for example, extraneous error checking, sentiment.
marginally decreasing the maximum benefit of the
interaction. Roughly speaking, the formulation of Using Oracles
the consequences is represented by the following For every system controlled by AI (or, for some human),
equations: we might think we could invent some kind of oracle to
track the response to each interaction. For each set of
Trust AI :V(consequences) stimuli, the system acts like a filter, producing a set of
= P(AITrustworthy) * V(positiveconsequences) response. Generically, the system acts like an if-then
+ P(AInotTrustworthy) * V(verynegativeconsequences) statement, i.e, the following:
(1)
if (set of stimuli) then (set of responses).
Distrust AI: V (consequences)=P(AITrustworthy) *
V (marginallypositiveconsequences) We then evaluate if the responses are trustwor-
+ P(AInotTrustworthy)* thy, that is, as expected, not expected, or forbidden.
V (marginally negative consequences)(2) These behaviors can, theoretically, at least, be speci-
fied in a tabular form, which helps us predict (and
The function P() represents “the probability of,” trust) the transactions, perhaps allowing us to adjust
and V() represents “value of,” whether in financial or the probabilities in (1) and (2). But by creating this,
costs (e.g., human lives, injury). We can tinker with the the table is just a version of the Gödel incomplete-
probabilities and the costs consequences to make ness problem, and it can be shown, using Cantor's
it seem better to trust the AI, but in safety-critical Diagonal argument, that the table can never be com-
systems, the cost of failure is always going to be pleted. That is, there is always a new, unencountered
extremely high (e.g., death, serious injury, destruction transaction, which should not be trusted in the sense
of costly infrastructure). Thus, if the decision to trust of Pascal's Wager.
is based strictly on minimizing the maximum loss, and
not on some personality-based objective, such as the Interrogating Prisoners
thrill seeking, then it is always better to distrust the AI In the absence of an oracle to determine the trust of
system on the first encounter. an AI system, could a probative mechanism be used?
A common technique for interrogating prisoners of
MONITORING THE ELUSIVE war can be used to continuously test the trustwor-
TRUST FACTOR thiness of humans and AI systems. The interrogator
Over time, our trust in another person or a system asks the prisoner a series of five to ten questions of
evolves through direct experiences and other evi- which the truthful answer is known. If the prisoner
dence such as third-party reports, news, and rumors. truthfully answers the first n questions, then there

www.computer.org/computingedge 41
INTERNET OF THINGS

is a certain degree of confidence in the response to lead to all kinds of moral dilemmas, such as an intel-
next questions (with unknown answers). In fact, as ligent car having to decide between running off the
the number of consecutive truthful answers given road and crashing into a school bus full of children, an
increases, the likelihood of the unknown question autopilot system choosing where to crash to minimize
being false diminishes. causalities, or the classic “trolley problem.” We have
In software testing, Miller et al.1 showed that no way to quantify the subtle considerations that
given T consecutive tests without a failure: have to be made in ethical dilemmas and, hence. do
not know how to build such AI. Furthermore, Asimov's
P (FailontestT+1afterTsuccessfultest) = 1/(n + 2). (3) laws do not inherently account for the possibility that
the system will fail, that is, deliver imperfect data or
By simply restating the problem as a trust test make an imperfect decision.
for the AI system and framing the “questions” as a Finally, any AI system that would choose to destroy
set of stimuli to which we expect a response, we can itself rather than harm another would not pass the
deduce that the probability of betrayal on the (n + Turing test. The philosopher Spinoza said “What if a
1)st interaction (after n trusted interactions) is 1/(n man could save himself from the present danger of
+ 2). So, as n grows large, the likelihood of betrayal death by treachery? … If reason should recommend
tends towards zero (unless we pass to the limit of that, it would recommend it to all men …” Consider
infinity, which is impossible). But we can use (3) to the computer (HAL) in the movie 2001: A Space Odys-
update the probabilities that an interaction has a sey (1968). HAL, an AI system that is “foolproof and
trustworthy answer in (1) and (2). What this all means incapable of error,” malfunctions, and, before it can be
is that we need to continuously and exhaustively taken offline, deliberately kills one of the astronauts to
test AI-based systems in order to maintain a reason- save itself. An AI system that had faithfully executed
able level of trust. But we can never completely trust Asimov's Laws would not attempt this murder, but a
the system. truly “intelligent” system trying to save itself would, as
would a faulty AI system.
TO ERR IS HUMAN
In his 1942 science fiction story “Runaround,” Isaac TO FORGIVE, AI
Asimov proposed three laws that must govern the Even if systems that behave like they should be per-
behavior of robots: ceived as untrustworthy when some party sees the
outcome as unfair, we expect humans to make mis-
R1. A robot may not injure a human being or, takes, to disappoint us by marginal performance, and
through inaction, allow a human being to come even to possibly betray us. But should we expect per-
to harm. fection from AI systems or forgive them when they do
R2. A robot must obey any orders given to it by fail? True AI means that the system must have a cer-
human beings, except where such orders would tain probability of acting in an aberrant (untrusted)
conflict with the First Law. manner. We can either build in the potential for
R3. A robot must protect its own existence as long betrayal or expect it, but in either case, we have to
as such protection does not conflict with the deal with the possibility in the outcome space.
First or Second Law [Asimov]. I am not suggesting that AI-enabled systems are
bad. On the contrary, they can make our lives easier
Asimov later added a 0th law: and better. It is just that we should not trust them
out-of-the-box to be any safer than non-AI-enabled
R0. A robot may not harm humanity, or, by inaction, systems. We must insist that they are developed in
allow humanity to come to harm. a very scrupulous and professional manner by those
who really know what they are doing, and we must
This seems like a reasonable framework for AI deci- insist that they prove their trustworthiness con-
sion that could promote trust. But the framework can tinuously. According to poet Alexander Pope “To err

42 ComputingEdge July 2021


INTERNET OF THINGS

is human, to forgive, divine.” But if he knew about AI,

Cutting Edge
he would have amended this to “To err is human, to
forgive, divine—but don't trust AI.” stay
on the
REFERENCES
1. K. Miller, et al., “Estimating the probability of failure
when testing reveals no failures,” IEEE Trans. Softw.
of Artificial Intelligence
Eng., vol. 18 , no. 1, pp. 33 – 43, Jan. 1992.
J a n ua ry/ f E b r ua ry 2 016

IEEE Intelligent Systems provides peer-

IEEE
2. I. Asimov, “Runaround,” Astounding Sci. Fiction, vol. 29, Also in this issue:
aI’s 10 to Watch
real-Time Taxi Dispatching
56
68

IEEE
January/FEBruary 2016
from flu Trends to Cybersecurity 84

no. 1, 1942. P U T T I N G A I I N T O P R A C T I C E

reviewed, cutting-edge articles on the


theory and applications of systems

Online BehAviOrAl AnAlysis


that perceive, reason, learn, and
PHIL LAPLANTE is a Professor of software and systems
act intelligently.

VOLuME 31
engineering with the Pennsylvania State University, Univer-

nuMBEr 1
www.computer.org/intelligent

IS-31-01-C1 Cover-1 January 11, 2016 6:06 PM

sity Park, PA, USA. Contact him at plaplante@psu.edu.

BEN AMABA is a Chief Innovation Officer for the Industrial


Manufacturing and Engineering Sector and a member of
The #1 AI Magazine
www.computer.org/intelligent

IEEE
the Artificial Intelligence and Data Science Elite Team, IBM,
Armonk, NY, USA. Contact him at baamaba@us.ibm.com

Call rticles
for A ing
e C o mput
iv
EE Pervas o n th
e late
st
IE , u s ef
ul p a p e r s
e,
a c ce s s
ible r vasiv
seek s e nt s in pe
v elopm ics
e d de g. Top
eview putin
peer-r ous co
m
u biquit a re
e , an d , s of t w
mobil e c h n ology
t
ware an d
e hard ensing
includ w orld s
l-
re , re a c tion,
f ra s truc tu u t e r intera
s: in mp
e li n e an- co
or gu
id
c tio n , hu m includ
ing
Au t h /mc / inter a
tions,
er.org e ra
privac
y.
mpu t consid
ww w .c o
htm d s y s te m s c u r it y, and
uthor. an se
sive /a bilit y,
p e r v a
ils: m e n t, scala
a y
e r de t deplo
Furth o rg
puter. sive
sive @ co m
g /perva
p e r va ter.or
.c ompu
www

www.computer.org/computingedge 43
EDITOR: Dimitrios Serpanos, ISI/ATHENA and University of Patras, serpanos@computer.org

This article originally


appeared in
DEPARTMENT: CYBER-PHYSICAL SYSTEMS
vol. 53, no. 1, 2020

Flexibility in Production Systems


by Exploiting Cyberphysical Systems
Arndt Lüder, Otto-von-Guericke University, Magdeburg

New IT and computer science solutions are needed to ensure an increased flexibility of
production systems. One key is using intelligent and self-responsible production system
components, the Industry 4.0 components. In this column, relevant requirements,
research and development trends, and issues still to be addressed are presented.

P
roduction systems, in general, are charac- processes that enhance the production skills of the
terized by the three main concepts they resource.
combine: products, production resources, The connection between products and resources
and production processes (Figure 1).1 The purpose is established by the production processes that are
of a production system is to produce products in an required to create the products and are provided by
amount and quality to meet demands of possible cus- the resources. In traditional production systems, the
tomers. The product’s design defines the appearance portfolio of possible products is strongly interlinked
and functioning of the final products by combining with the set of resources that are used. This linking
and processing the defined materials in an estab- is done when the production system is engineered
lished way. The main outcome of the product design, by integrating the production process characteris-
from the production system point of view, is the set of tics required for the intended products within the
required materials (the bill of material definition) and structure of the production components (technical
a partially ordered sequence of production processes bordering conditions) and within the control software
to be executed on them (the bill of operation). (sequence and parameterization of necessary process
Production resources are used to ensure the steps). Thus, only those products that are predicted in
implementation of the processes. The resources are the design stage can be created within such produc-
organized in a hierarchy of production system compo- tion systems.2
nents, whereby each component executes a share of Increasing competition in global markets is leading
the production process provided by the resource. The to new challenges. Customer requirements are chang-
complexity of this share can range from a very simple ing very fast. Technological process is driving changes
task, like opening a valve or rotating a drive, to com- related to applicable production system components.
plex processing, like welding a line. In general, each Lawmakers are increasingly facing social and ecologi-
component provides production functionalities that cal challenges that increase the number of regulations
add value to the product or support the value-adding to be considered. All of these challenges change (in
fact reduce) the time that classically designed produc-
tion systems are economically viable.
Digital Object Identifier 10.1109/MC.2019.2949107 In response, a new type of production system is
Date of current version: 15 January 2020 being considered,3 based on self-reliable production

44 July 2021 Published by the IEEE Computer Society  2469-7087/21 © 2021 IEEE
Is Scheduled On
Product Resource
Is Producing

Can Make Shall Execute


Process
Requires Can Execute

FIGURE 1. Relations among products, production processes, and production resources.

system resources established by a hierarchy of as technical, quality related, economic, and


self-aware production system components and prod- ecological bordering issues
ucts. Within such a production system, products will ›› be able to use the interfaces exposed by
be able to automatically find the resources needed resources.
to execute the production processes required to cre-
ate them. Thus, the process of linking product and PRODUCTION SYSTEM CONTROL
production resources is done while the production Traditionally, control of production systems follows
system is operating. the pattern of the classical automation pyramid,4
To make such a production system applicable, pro- which usually establishes a hierarchy of production
duction resources need to system components controlled in a closed-loop struc-
ture. This closed loop is established by measuring the
›› integrate themselves in the overall production state of the technical system using appropriate sen-
system through their own ability to plan and sors, deciding on necessary control actions within
address their own maintenance requirements controllers based on measured state and behavior
›› express their skills, including those related specifications, and executing these control actions
to technical requirements, quality, economic by actors. Thus, information processing is essential
benefits, and ecological issues for guiding the behavior of the production system.
›› expose interfaces that enable other entities in The controllers within these closed loops estab-
the production system to use the resources. lish a distribution of necessary control decisions. 5
According to the classical approach of the automation
In addition, products need to pyramid, this distribution forms a strict separation
of considerations where lower-layer controllers are
›› know details about the way they have to be responsible for the behavior of smaller components,
produced, including sequence and param- while higher-layer controllers control larger compo-
eterization of necessary process steps as well nents.1 So lower-layer controllers are in a position to

www.computer.org/computingedge 45
CYBER-PHYSICAL SYSTEMS

THE INDUSTRY 4.0 COMPONENT


Administration Shell 2 The envisioned Industry 4.0 components and their use
4
within Industry 4.0 production systems will provide the
solution to the previously mentioned challenges. They
Technical Virtual will employ CPSs with capabilities for self-awareness,
3 Functions Representation
6 1
self-planning, self-control, and self-maintenance as
5 well as cooperation. Several research and develop-
ment activities are moving in this direction in Germany
Controller and elsewhere. The results are interesting, but several
issues remain open.

Thing
Reached developments
The different ongoing research and development
FIGURE 2. The architecture of the Industry 4.0 component activities naturally have various goals. These range
with an asset administration shell. from developing general architectures and detailed
designs of architecture components to proving the
applicability of different technologies within the over-
more closely control production system physics than all architecture or their components. Handbuch Indus-
higher-layer controllers, which are specifically respon- trie 4.0 Bd. 2: Automatisierung6 includes a collection
sible for planning decisions. of application cases and descriptions of technol-
Depending on industry, bordering conditions of ogy descriptions. The “Industry 4.0 Platform”7 shows
the production system, intended system structuring, results of standardization efforts. Both sources are
different types of control devices, and control soft- regularly updated as progress is made.
ware are applied. These systems are programmable All research and development activities employ a
logic controllers, numeric controllers, robot control- common general architecture pattern for the Indus-
lers, PC-based controllers, and others with their try 4.0 component depicted in Figure 2.7 This com-
specialized languages but also with programming ponent is an identifiable, communication-enabled,
languages like C, Python, or (seldom) Java. and cooperative combination of one or more
To accommodate greater flexibility, the auto- physical assets accompanied and supervised by
mation pyramid is increasingly giving way to more an administration shell.7 This shell provides a vir-
heterarchical and distributed control architectures tual representation of the covered asset as well as
that combine lower-layer (process control) and access to its technical functionalities. The virtual
higher-layer control (planning) decisions within one representation can be viewed as a semantically and
device related to one production system component, metadata-enriched collection of the possibly inter-
leading to so-called cyberphysical systems (CPSs). linked individual sets of data describing the asset
According to Encyclopedia of Business Informatics, from all perspectives, which might be relevant within
a CPS is a combination of components with physical its lifecycle.
and data processing parts involving communication. The physical asset is not necessarily a simple or
CPSs range from very simple embedded systems, for trivial object. It can contain its own controller, pro-
example, drives or rotary encoders, to very large ones, viding it with all necessary intelligence and control
such as production systems, power plants, energy decisions for the execution of the specified technical
transmission systems, airplanes, and train systems. functions. Thus, two intelligent pieces may be involved
Cyberphysical production systems are intended in the Industry 4.0 component: the management shell
to be used to form the new type of production sys- and the asset internal control.
tems already described. But to do so, they have to ful- This architecture calls for implementation deci-
fill the requirements presented for production system sions addressing six problems. First, the virtual
components. representation has to be set up [(1) in Figure 2]. Here,

46 ComputingEdge July 2021


CYBER-PHYSICAL SYSTEMS

the different lifecycle phases of the asset need to be independently of the realization of the virtual repre-
considered with respect to relevant data sets and sentation that may be with OPC UA or AutomationML.
usable implementation technologies. While data for- The current state of the art enables
mats such as AutomationML are considered during resource-related flexibility. Industry 4.0-based pro-
engineering, Open Platform Communications (OPC) duction system components can integrate them-
Unified Architecture (UA) is the top consideration selves in the overall production system. They can
during use. Between the two phases, that is, during expose interfaces that enable their use by other
system setup, specialized XML dialects or Java Script production system entities and plan their actions, if
Object Notation can become relevant. The data struc- requested from outside, based on described skills.
turing in the virtual representation is currently under Thus, a high degree of resource and process flex-
development.7 ibility is reached.
The second problem is the realization of the access
to the virtual representation [(2) in Figure 2]. Here, the
implementation technologies of the virtual represen-
TO ENABLE INCREASED PROCESS
tation define possible access paths. Especially during
FLEXIBILITY THROUGH THE
use, OPC UA gives detailed implementation specifica-
OPTIMIZED USE OF INDUSTRY
tions. During engineering, this is more open. Depend-
4.0 COMPONENTS, THEIR SELF-
ing on the engineering network architecture, different DESCRIPTION NEEDS TO BE
types of information logistics implementations can be IMPROVED.
applied.8
The third problem involves implementation of the
supervision and provision of the technical functions
[(3) in Figure 2]. Currently, the use of service-oriented Open issues
architectures is being explored. This technology There remain several open questions to increase
enables the self-description of services and their product, process, and resource flexibility within pro-
orchestration, following the needs of the accessing duction systems while also fulfilling all of these var-
entity. ious requirements. To enable complete self-control
Consequently, access to the technical functions of production resources including self-planning,
[(4) in Figure 2] is also realized by service access. It self-maintenance, and similar capabilities and, thus,
enables the use of existing IT technologies as well as increase resource flexibility, Industry 4.0 components
smooth integration with existing IT landscapes. cannot be only service oriented and, thereby, reactive;
The integration of the technical function realiza- they need to be proactive. Agent-based implementa-
tion within the asset with its supervision and control tions that extend service orientation provide a prom-
within the administration shell [(5) in Figure 2] is ising solution.9
highly asset dependent. Nevertheless, OPC UA is To enable increased process flexibility through
one of the most commonly considered technologies the optimized use of Industry 4.0 components, their
for this integration. Within the German Mechani- self-description needs to be improved. On one hand,
cal Engineering Industry Association, several the description of technical functions needs to be
industry-driven OPC UA compendium specifications detailed. The current focus on technical border-
are under development for that purpose. ing conditions needs to be enlarged to integrate
The last problem is the integration of the super- reachable production process quality, economic
vision and control of the technical functions with effects, ecological effects, and so on. Therefore,
the virtual representation [(6) in Figure 2]. The main new methods of skill representation and evaluation
purpose of this integration is to enable the provision are required. At the same time, the representation of
of semantically enriched asset state and behavior data within the virtual representation of the Industry
information accompanied by engineering data. 4.0 component needs to be standardized. This stan-
OPC UA is one candidate for the realization as well, dardization will not only define the metastructure

www.computer.org/computingedge 47
CYBER-PHYSICAL SYSTEMS

of the data but also specify how the different related “Engineering processes for decentralized factory
engineering and usage disciplines will be represented automation systems,” in Factory Automation, J.
and integrated. Silvestre-Blanes, Ed., Vienna, Austria: In-Tech, 2010.
Additionally, the product has to be considered [Online]. Available: http://www.intechopen.com
an independent and proactive Industry 4.0 compo- /articles/show/title/engineering-processes-for
nent, driving the production process and increasing -decentralized-factory-automation-systems
product flexibility. Agent technologies, which have 6. B. Vogel-Heuser, T. Bauernhansel, and M. ten Hompel,
been considered for several years as a means for Eds., Handbuch Industrie 4.0 Bd.2: Automatisier-
distributed proactive control, can assist the imple- ung, Berlin, Germany: Springer-Verlag, 2017. doi:
mentation. However, a slightly different component 10.1007/978-3-662-53248-5.
architecture may be required to address the special 7. Federal Ministry for Economic Affairs and Federal
requirements of product flow through in a produc- Ministry of Education and Research. “Industry 4.0
tion system. Platform.” Accessed on: 2019. [Online]. Available: https:
//www.plattform-i40.de/PI40/Navigation/DE/In-der

T he state-of-the-art related to Industry 4.0-based


flexibility enables a wide range of successful appli-
cations that provide increased gains within industry.6
-Praxis/Online-Bibliothek/online-bibliothek.html
8. A. Lüder, J.-L. Pauly, F. Rinker, and S. Biffl, “Data
exchange logistics in engineering networks exploiting
There are still several steps to take on the way to pow- automated data integration,” in Proc. 24th IEEE Conf.
erful industrial solutions that fulfill the requirements of Emerging Technologies and Factory Automation,
Industry 4.0. We will make them based on established Zaragoza, Spain, Sept. 2019. doi: 10.1109/ETFA
technologies like Jade, OPC UA, and AutomationML .2019.8869352.
on their improvement, especially with respect to their 9. VDE-GMA, Frankfurt am Main, Germany, “Status
required integration, and on their enhancement with report: Agents for the realization of Industrie 4.0,” Aug.
completely new ideas like automatic self-generation 2019. [Online]. Available: https://www.vdi.de/ueber
based on engineering data or automatic update fol- -uns/presse/publikationen/details/agents-for-the
lowing plug-and-play methods. -realisation-of-industry-40

REFERENCES
1. S. Biffl, A. Lüder, and D. Gerhard, Eds., ARNDT LÜDER is the head of the Institute of Ergonomics,
Multi-Disciplinary Engineering for Cyber-Physical Manufacturing Systems and Automation, Otto-von-Guericke
Production Systems: Data Models and Software Solu- University, Magdeburg, Germany. He is a Member of the IEEE
tions for Handling Complex Engineering Projects. New Industrial Electronics Society and a member of the board of
York: Springer-Verlag, 2017. directors of the AutomationML Association. Contact him at
2. H. ElMaraghy, “Flexible and reconfigurable manufac- arndt.lueder@ovgu.de.
turing systems paradigms,” Int. J. Flexible Manuf. Syst.,
vol. 17, no. 4, pp. 261–276, 2005.
3. H. Kagermann, W. Wahlster, and J. Helbig, Eds., Umset-
zungsempfehlungen für das Zukunftsprojekt Industrie
4.0: Abschlussbericht des Arbeitskreises Industrie 4.0,
Bundesministerium für Bildung und Forschung. Frank-
furt am Main, Germany: Forschungsunion Wirtschaft
und Wissenschaft, 2013.
4. E. Trunzer et al., “System architectures for Industrie
F O LLOW US
4.0 applications: Derivation of a generic architecture @ s e cu rit y p riv a c y
proposal,” Prod. Eng., vol. 13, nos. 3–4, pp. 247–257, June
2019. doi: 10.1007/s11740-019-00902-6.
5. T. Wagner, C. Haußner, J. Elger, U. Löwen, and A. Lüder,

48 ComputingEdge July 2021


EDITOR: Robert Blumen, SalesForce, robert@robertblumen.com
This article originally
appeared in
DEPARTMENT: SOFTWARE
ENGINEERING RADIO vol. 37, no. 5, 2020

Bert Hubert on the Domain


Name System
Gavin Henry

FROM THE EDITOR


Bert Hubert, author of the open source PowerDNS nameserver, discusses Domain Name System (DNS)
security and all aspects of DNS. Host Gavin Henry spoke with Hubert about what DNS is as well as
its history, attacks, flaws, privacy, encryption, integrity, trust, defending against query failure, DNS
over HTTPS, DNS over Transport Layer Security (TLS), DNS Security Extension (DNSSEC), HTTP/2
with DNS, Quick User Datagram Protocol (UDP) Internet Connections, monitoring DNS traffic, cache
poisoning, amplification attacks, UDP attacks, URL fetch attacks via Twitter, browser DNS lookups,
social-engineering attacks, and what you need to worry about DNS as a software engineer. We provide
summary excerpts below; to hear the full interview, visit http://www.se-radio.net or access our archives
via RSS at http://feeds.feedburner.com/se-radio.—Robert Blumen

Gavin Henry: What is a DNS? What else is stored in a DNS?

Bert Hubert: When you type a name in the Internet, DNS also denotes where the mail server for a domain is
the computer cannot directly connect. It must look located, as an example. That’s the mail exchanger (MX)
up the Internet Protocol (IP) address of that website— record. If you have a network with many subscribers
IPV4 or IPV6—which DNS provides. A lot happens to and you’re worrying about bad behavior, such as serv-
make DNS work well. Browsers ensure that their que- ers that have been hacked, you can check in DNS how
ries get answers quickly, because speed affects the many MX domain queries the server is doing because
user experience. hacked servers will attempt to spam widely. Then, you
It’s an old protocol that we rely on, and it’s tricky. see tons of MX records.
There is a difference between “this name doesn’t More frequent than MX records are text records
exist” and “the name exists, but it doesn’t have an IPV6 that store arbitrary bits of text in DNS. These are used
address.” The latter says the name does exist, but the by many spam lists to identify IP addresses known to
thing you asked for doesn’t. But often, you get back be spamming or domain names known to be phishing.
the answer, “the name doesn’t exist,” or “we tried to Many mail servers perform DNS text-record lookups to
resolve this name, but we it didn’t work.” This has led figure out if a sending mail server is known to spam.
to websites disappearing from the web because a load With all its faults and its age, DNS is still the one tech-
balancer messed up this nuance. nology that functions as a low-investment worldwide
distributed database; you can ask it many questions
per second and get good answers.
Digital Object Identifier 10.1109/MS.2020.3000883
Date of current version: 20 August 2020 What types of DNS servers are there?

2469-7087/21 © 2021 IEEE Published by the IEEE Computer Society July 2021 49
SOFTWARE ENGINEERING RADIO

This process was originally thought to be too

SOFTWARE much work for simple computers. So a separate server

ENGINEERING RADIO was invented called a resolver (or a cache), which


would traverse these authoritative servers, start-
ing from the root server, to find the answer to your
Visit www.se-radio.net to listen to these and other question. Thus, in your browser, you type the domain
insightful hour-long podcasts. name you want to visit. The browser sends the query
to its configured resolver that is part of your local
RECENT EPISODES network. And the resolver trolls the whole Internet
»» 413—Spencer Kimball, cofounder and CEO and consults authoritative servers until it finds the
of Cockroach Labs, talks with host Akshay right answer.
Manchale about CockroachDB, an open source The resolvers come with a hints file that contains a
distributed database system. list of about 26 IP addresses, which might be outdated
»» 412—Host Felienne speaks with Gavis-Hugh- if you haven’t turned the computer on for a few years.
son about how to prepare for the dreaded At startup, a resolving name server tries these hints
“whiteboard interview,” and how to get better at
records to find a name server that answers. Chances
doing interviews.
are that the resolver will find one IP address that
»» 409—Joe Kutner, software architect for Heroku
at salesforce.com, discusses the 12-factor app works, and from there, it can learn the latest list of 26
with host Kanchan Shringi. IP addresses.

UPCOMING EPISODES What about integrity and encryption with a DNS?

»» Adam Shostack discusses threat modeling with


host Justin Beyer. DNSSEC adds integrity to a DNS; if you have an answer,
»» Host Adam Bell talks about incident response it can validate the answer. But applications that use a
with Berkay Mollamustafaoglu. DNS typically don’t validate DNS answers. Even brows-
»» Vladimir Khorikov discusses functional pro- ers simply query a name server and trust the answer.
gramming in enterprise applications with host It’s technically possible for a browser to validate DNS
Jeremy Jung.
answers using DNSSEC, and many domain names are
now DNSSEC signed. But browsers have decided to
put trust in TLS certificates instead.
TLS provides transport security. It validates that
the data you received are what you should have
received. DNSSEC works more like Pretty Good Pri-
There are authoritative name servers—those that vacy or secure Multipurpose Internet Mail Extension
say, “I know all about some website, and this is the programs—it signs the final answer to your question,
IP address of that website.” Queries on the Internet which is the actual name/IP-address combination.
start with root servers: more than 1,000 servers with That has made DNSSEC difficult to implement.
26 IP addresses. You can query these 26 IP addresses The idea behind TLS is that you trust the certifi-
and get an answer. Root servers don’t know a lot, cate’s final verification of HTTPS. If you trust HTTPS for
but they can give you a list of IP addresses for the message integrity or transport integrity, you no longer
dot-com servers. You can query the dot-com serv- care about the IP address because the transport has
ers for an IP address, and a dot-com server will say, “I integrity. The common view is that you don’t need to
don’t know, but I do know where the name servers are worry about DNSSEC if you’re encrypting. But there
for that website. Ask over there, and here are their IP have been brief hijacks of the DNS name in which
addresses.” And then you end up with this authorita- people have been able to get new TLS certificates dur-
tive server that I first mentioned, and that server can ing the hijack. That is where DNSSEC validation would
actually tell you the right IP address. have helped.

50 ComputingEdge July 2021


SOFTWARE ENGINEERING RADIO

What about privacy? sites you are visiting. But it’s not progress if now some
American company knows what sites you are visiting.
DNS traffic tells you everything about a person. If you However, the largest Internet service providers are
have access only to someone’s DNS records, you will now either offering or developing fully encrypted DNS.
be able to tell where they live, what phone they have, So there is not much benefit anymore in sending all
or what brand of TV they have, and so forth. Per bit, encrypted data to a third party that you did not select.
DNS may be the most privacy-sensitive material on
the Internet. It is worthwhile to protect DNS records What one thing should a software engineer remember?
because we don’t want too many people to have
access to those. Monitor DNS. When it breaks, everything will break, so
If someone has a Tesla and I know that they work it is worth adding diagnostics. If you have long-lived
at a certain company and which sports team they applications, the DNS answer that you got at the
like, that narrows down a search for a person. All this start-up of the application that you cached from weeks
information radiates from that person’s Internet con- ago may no longer be the right IP address. DNS is more
nection through a DNS. dynamic than it used to be.
A common current view is that we should encrypt
DNS wherever we can and then send it to a new third
party, which then gets access to all your browsing GAVIN HENRY is the founder and managing
data. I’m not convinced that that is actually progress. director of SureVoIP, an Internet telephony
Previously, we had a highly regulated telecommunica- service. Contact him at ghenry@surevoip
tions company, at least here in Europe, that knew what .co.uk.

From the analytical engine to the supercomputer,


from Pascal to von Neumann, from punched
cards to CD-ROMs—IEEE Annals of the History
of Computing covers the breadth of computer
history. The quarterly publication
is an active center for the collection and
dissemination of information on historical
projects and organizations, oral history activities,
and international conferences.

www.computer.org/annals

www.computer.org/computingedge 51
EDITORS: Davide Balzarotti, davide.balzarotti@eurecom.fr
William Enck, whenk@ncsu.edu, Samuel King, kingst@ucdavis.edu
Angelos Stavrou, astavrou@gmu.edu This article originally
appeared in

DEPARTMENT: vol. 18, no. 4, 2020


SYSTEMS ATTACKS AND DEFENSES

A Cybersecurity Terminarch:
Use It Before We Lose It
Eric Osterweil, George Mason University

W
hy can’t we send encrypted email
(secure, private correspondence that term · in · arch
even our mail providers can’t read)? Why /’ t rm , närk/
do our health-care providers require us to use secure noun
portals to correspond with us instead of directly email- an individual that is the last of its species
ing us? Why are messaging apps the only way to send or subspecies. Once the terminarch dies, the
species becomes extinct.
encrypted messages directly to friends, and why can’t
we send private messages without agreeing to using
a single platform (WhatsApp, Signal, and so on)? Our
cybersecurity tools have not evolved to offer these
services, but why? DNS Security Extensions (DNSSEC). DNSSEC’s pro-
Cybersecurity and cryptographically enhanced tections stem from the DNS tree’s root TA [often called
tools in the Internet have faced an uphill battle for the Root Zone’s Key Signing Key (Root KSK)].
many years, due in no small part to the fact that Since its deployment, the management, mainte-
we do not have a global architecture for deploying nance, and policies surrounding the Root KSK have
interorganizational (platform-agnostic) verifiability, been overseen by an international multistakeholder
authentication, and encryption. This deficiency stems community, the Internet Corporation for Assigned
largely from the absence of a single/unambiguous Names and Numbers (ICANN) community.1 This model
global-root cryptographic key for verification [i.e., a ensures that there is no single entity that has unilat-
public key that is usable as a global Trust Anchor (TA)]. eral jurisdiction over the Root KSK. Today, DNSSEC’s
A global TA could be used to foundationally enhance protocol, policies, and infrastructure are operationally
protections for security tools, protocols, and more, mature and widely distributed. However, these pro-
but attempts to deploy one in the Internet have a long tections lie at the low level of the Internet’s founda-
history of failure. tion and are not often noticed at the application (or
To date, there has only been one success story, other user-facing) layer(s). This has left the potential
and, fortunately, it is still operating. Today, almost to extend DNSSEC’s verification protections largely
everything we do online begins with a query to a untapped. Moreover, the model we are using exposes
single-rooted hierarchical global database, whose systemic vulnerabilities.
namespace is collision-free, and which we have relied Since the late 1990s, the verification and authen-
on for more than 30 years: the Domain Name System tication used by essentially all our security protocols
(DNS). Moreover, although the DNS protocol did not have made do with a collision-prone hierarchical verifi-
initially have verification protections, it does now: the cation model called the Web public-key infrastructure
(Web PKI). Interfaces like secure sockets use the Web
PKI so that applications can benefit from protections
Digital Object Identifier 10.1109/MSEC.2020.2989703 from this model without needing to delve into its com-
Date of current version: 9 July 2020 plexity. Under these covers, the Web PKI’s verification

52 July 2021 Published by the IEEE Computer Society  2469-7087/21 © 2021 IEEE
substrate uses multiple roots (i.e., multirooted veri- There have been several community attempts
fication). It is a loosely organized list of certification to create single-rooted verification hierarchies for
authorities (CAs) that our software uses to verify Internet services, but single-rooted verification has
essentially all our interorganizational data and trans- proven to be a difficult species to breed. In 1989,
actions (TLS tunnels, HTTPS, secure SMTP, file encryp- there was an attempt to create a single global root for
tion, etc.). The Web PKI provides verification and also Privacy-Enhanced Mail in RFC-1114, but the question
asserts trust, but these are separable protections. of who would operate that root was never answered.
Although the Web PKI has raised the bar on mis- Later the Web PKI began deployment but not as a
creants, it has also left important security doors multirooted hierarchy. In 1995, VeriSign, Inc. had its CA
unguarded. Without a definitive starting point for certificate configured in the then-dominant Netscape
verification, multirooted verification hierarchies suffer Navigator web browser.3
from architectural vulnerabilities. For instance, when At that time, secure web connections verified all
a multirooted verification hierarchy like the Web PKI websites’ cryptographic keys by tracing secure delega-
is used to authenticate HTTPS web transactions, rely- tion paths from that single root. However, the Web PKI
ing party software packages (like web browsers) have did not have protections that mandated a single root,
no way to know which CA is authorized to vouch for a and as browser software continued to diversify and the
website. This is a problem because it can lead to attes- World Wide Web continued to grow, the list of root CAs
tation collisions; whereby browsers have no choice also grew. Today, there are hundreds of root CAs in the
but to trust any certificate that is verified by any CA. Web PKI that are configured in browsers, and they are
One of the earliest high-profile exploits of this often maintained (i.e., rolled over, revoked, or otherwise
attack vector was on a CA named DigiNotar in 2011.2 changed) in nontransparent/nonstandard ways.
That event served as a large-scale existence proof More recently, the Internet Engineering Task Force
of the vulnerability of this model. In multirooted (IETF) has standardized protocols for verifying the
hierarchies, RPs generally don’t even have a way to proper holders of Internet Protocol (IP) addresses and
know who all the roots are supposed to be. Knowing autonomous system numbers using an architecture
all the CA roots in the Web PKI is an open challenge. called the Resource Public-Key Infrastructure (RPKI) in
Browsers attempt to stay current with each other’s RFC-6480. After years of trying to align Internet stake-
trust stores, and there is an organization called the holders, and even after unambiguous advice from the
CA/Browser (CAB Forum) to coordinate this, but other Internet Architecture Board in 2010, the RPKI has not
systems that have tried to use TLS (HTTPS’s under- been able to agree on a single root and now plans to
lying secure connection protocol) have found this operate in perpetuity as a multirooted hierarchy. Just
intractable. Uses in software like mail servers have as with the Web PKI, the RPKI now has attestation
essentially become nonstarters for that reason. collisions. Missed attempts like these underscore the
Single-rooted verification hierarchies (like tradi- singular opportunity that DNSSEC represents. It has
tional PKIs) address the aforementioned problems at even succeeded at an operational scale that other
an architectural level. With a single root, there is no large (private) single-rooted PKIs have failed. As the
ambiguity about which signing authority is allowed to first and only example of a deployed Internet-scale
vouch for whom (the single root clearly disambiguates single-rooted verification hierarchy species, one could
this), and there is only one single (well-known) root for worry that we will not be able to create and operation-
RPs to bootstrap and maintain. alize another.

www.computer.org/computingedge 53
SYSTEMS ATTACKS AND DEFENSES

New standards, like the DNS-based Authenti- those of Namecoin, Ethereum Name Service, or the
cation of Named Entities (DANE) suite (RFC-6698, GNU Name System) could portend extinction, and
RFC-8162, and RFC-7929)4 have emerged that have alternate verification schemes like certificate trans-
the immediate potential to be used to unambiguously parency, which essentially enshrine a global default
secure our protocols and data by using DNSSEC. trusted source (the way the Web PKI started), herald
At a time when recent global events have caused a the same. In its current state, the DNS has been an
dramatic increase in teleworking, distance learning, extensible resource for more than 30 years, and we
and reliance on online communications and when our have only just begun to tap its potential as a cyberse-
Internet privacy has become top-of-mind to many, why curity substrate.
shouldn’t we be able to apply end-to-end encryption
and object-security to our online lives? HOW SECURE IS DNSSEC? YOU
Looking forward, this should also include email, BE THE JUDGE!
medical records, cybersecurity information sharing, The operations of the DNSSEC root zone follow the
and much more. Indeed, now is the right time for us to strictest form of security hygiene. The DNSSEC root
reassess the foundations that we have built our pro- follows a DNSSEC Practice Statement (which is pub-
tections on, and also consider if we may be undermin- lished and available to anyone to inspect at iana.org);
ing our strongest (and largely untapped) foundational its cryptographic keys are maintained in FIPS 140-2
component. Level 4 hardware security modules, the process and
installations have achieved SOC 3 certification for nine
PROBLEMS ON THE HORIZON consecutive years, there are multiple geographically
Recent DNSSEC-based protocols, like DANE, enable distributed disaster recovery sites, and high-value
rich protections and are within our grasp; that is, if we top-level domains (TLDs) (like .com, .net, and so on)
don’t lose them before we use them. Several recent are also following the same level of security practices.
proposals for DNS over HTTPS, DNS over TLS, and Even routine processes like generating zone
even DNS over QUIC aim to add security and privacy signing keys require a quorum of trusted community
protections in ways that would actually create verifi- representatives to be physically present and to verify
cation loops and thereby fundamentally (albeit inad- material, transactions, and adherence to the ICANN
vertently) jeopardize the security, stability, and resil- community processes. The DNSSEC root and TLDs are
iency (SSR) of the DNSSEC. being meticulously protected and managed to ensure
These proposals focus on using transport-layer the SSR of the entire DNS hierarchy with the same
security protections, derived from verification per- level of security as CAs.
formed by the Web PKI, to access DNSSEC. This would Even exceptions are treated with the highest level
be a disastrous weakness because it would fundamen- of prudence. In 2017, the Root KSK was scheduled
tally undercut DNSSEC’s verification substrate. Our to gracefully transition to a newer key (i.e., rollover)
single-rooted verification hierarchy would (effectively) because of proactive operational hygiene. However,
become a subtree under the multirooted Web PKI. before this rollover was executed, measurements indi-
DNSSEC’s protections would be subordinated and cated a potential problem, which prompted operators
thereby have an architectural dependency. Although to postpone this rollover. This prudence serves as just
the proposal to protect the transport of DNS is well one of many examples of the diligence and care that
intended, the approach must not come at the greater exists in the management of DNSSEC’s global root
cost of our architectural correctness. If we aren’t con- key. In short, experts are plugged in and taking every
scientious in our designs, we may never get another precaution necessary to ensure proper operation and
global single root, making DNSSEC a terminarch (i.e., success of this critical resource.
the last of its kind).
Other proposals for alternate (i.e., competing) DEPLOYING DNSSEC
DNS roots (such as the Yeti DNS project) threaten Now that DNSSEC is enjoying broad adoption by
potential disaster, alternate naming schemes (like service providers, there are increasingly easy ways

54 ComputingEdge July 2021


SYSTEMS ATTACKS AND DEFENSES

for administrators to deploy it. For those who oper- possibilities for Internet cybersecurity companies,
ate their own DNS infrastructure, almost all mod- start-ups, and more.
ern DNS name server software platforms can enable
DNSSEC via trivial configurations. For those who use
DNS registrars or other managed DNS (mDNS) pro-
viders to operate their DNS infrastructures, many
T his all stems from DNSSEC’s global single root,
the DNS Root KSK, the multistakeholder policy
community, and the state-of-the art operations that
of these providers offer to deploy and manage DNS- support the cryptographic material. Cybersecurity
SEC through configuration pages in their online por- professionals have the opportunity now to embrace
tals. Often, simply looking at the existing config- this resource and capitalize on it to bring the Inter-
uration options of either one’s own infrastructure net’s cybersecurity to a new high watermark, but
or the pages of one’s provider can be the one-stop we as a community need to continue to carefully
shopping for turning DNSSEC on. The DNSSEC com- protect the Internet’s first (and possibly last) global
munities want to help, and resources like the Inter- single-root verification terminarch: DNSSEC.
net Society’s Deploy 3605 pages offer resources for
guidance to answer questions and to otherwise help REFERENCES
with deploying DNSSEC. 1. “ICANN’s multistakeholder model,” ICANN. [Online].
Available: https://www.icann.org/community
USE IT BEFORE WE LOSE IT 2. D. Fisher, “Final report on DigiNotar hack shows total
Although using the DNS to resolve a domain name compromise of CA servers,” Threatpost, Oct. 31, 2012.
to an IP address is a critical starting point for almost [Online]. Available: https://threatpost.com/final
all our transactions on the Internet, the DNS was -report-diginotar-hack-shows-total-compromise-ca
designed to be used to look up essentially arbitrary -servers-103112/77170/
data. Based on this, DNSSEC has evolved the DNS 3. N. Wingfield, “Digital IDs to help secure Internet,”
into a global PKI. DNSSEC is in a position to implement InfoWorld, Oct. 23, 1995. [Online]. Available: https:
general-purpose object security. This could be used to //tinyurl.com/yaf6cwun
secure threat intelligence, cybersecurity information 4. “How DANE strengthens security for TLS, S/MIME, and other
sharing, the Internet of Things, email, electronic pro- applications,” Verisign, Nov. 19, 2015. [Online]. Available:
tected health information (e-PHI), and much more. https://blog.verisign.com/security/how-dane-strengthens
By using DNSSEC as the Internet’s global single -security-for-tls-smime-and-other-applications/
root, we will get interoperability across all those Inter- 5. Internet Society. Accessed on: May, 9, 2020. [Online].
net systems that already speak DNS. With DNSSEC, Available: https://www.internetsociety.org/deploy360
we can secure caches against poisoning attacks and /dnssec/
reduce transitive trust attack surfaces.6 The DNSSEC 6. E. Osterweil, D. McPherson, and L. Zhang, “The shape
deployment is now counted in the millions of domains and size of threats: Defining a networked system’s
and has been growing and succeeding at exponential attack surface,” in Proc. 2014 IEEE 22nd Int. Conf.
rates, and operators are becoming increasingly adept Network Protocols (ICNP), pp. 636–641. doi: 10.1109
at managing their cryptographic deployments.7 It is /ICNP.2014.101. [Online]. Available: https://ieeexplore
ready to be built on. .ieee.org/abstract/document/6980440
Protocols like DANE propose to do exactly that, 7. “Growth and health metrics for the global deployment,”
thereby repairing architectural holes that have 2020. [Online]. Available: http://secspider.net/
hamstrung HTTPS. This will allow us to enable fallow
object-security models, like using S/MIME for secure
end-to-end email encryption and signing.4 This would ERIC OSTERWEIL is the vice-chair of the ICANN Second
not only plug existing security holes, it would also Security, Stability, and Resiliency Review Team (SSR2 RT).
give us never-before-seen cybersecurity facilities. Osterweil received a Ph.D. from the Computer Science
Even DANE’s nascent deployment already numbers Department, George Mason University, Fairfax, Virginia.
in the hundreds of thousands. It has opened new Contact him at eoster@gmu.edu.

www.computer.org/computingedge 55
IEEE Internet Computing delivers novel content
from academic and industry experts on the
latest developments and key trends in Internet
technologies and applications.

Written by and for both users and developers,


the bimonthly magazine covers a wide range
of topics, including:
• Applications
• Architectures
• Big data analytics
• Cloud and edge computing
• Information management
• Middleware
• Security and privacy
• Standards
• And much more

In addition to peer-reviewed articles,


IEEE Internet Computing features industry
reports, surveys, tutorials, columns, and news.

www.computer.org/internet

VOLUME 22, NUMBER 2 MARCH/APRIL 2018


IEEE INTERNET COMPUTING

VOLUME 22, NUMBER 4 JULY/AUGUST 2018


 July/August 2018
IEEE INTERNET COMPUTING

IEEE INTERNET COMPUTING

Evolution of Rack-Scale Systems

VOLUME 22, NUMBER 1 JANUARY/FEBRUARY 2018


 January/February 2018

VOLUME 22, NUMBER 3 MAY/JUNE 2018


 May/June 2018
IoT-Enhanced Human Experience

Connected and Autonomous Vehicles

IoT-Enhanced Human Experience


Evolution of Rack-Scale Systems
Volume 22
Number 1

Volume 22

www.computer.org/internet
Number 4

Healthcare Informatics and Privacy


www.computer.org/internet

Join the IEEE Computer Society Connected and Autonomous Vehicles

for subscription discounts today!
Volume 22

www.computer.org/internet
Number 3

www.computer.org/internet

www.computer.org/product/magazines/internet-computing
Get Published in the IEEE Open
Journal of the Computer Society

Submit a paper today to the


premier open access journal
in computing and information
technology.

Your research will benefit from


the IEEE marketing launch and
5 million unique monthly users
of the IEEE Xplore® Digital Library.
Plus, this journal is fully open
and compliant with funder
mandates, including Plan S.

Submit your paper today!


Visit www.computer.org/oj to learn more.
Conference Calendar

I EEE Computer Society conferences are valuable forums for learning on broad and dynamically shifting top-
ics from within the computing profession. With over 200 conferences featuring leading experts and thought
leaders, we have an event that is right for you. Questions? Contact conferences@computer.org.

AUGUST Decentralized Applications Cluster Computing), Portland,


9 August and Infrastructures), virtual Oregon, USA
• ICKG (IEEE Int ’ l Conf. on • JCC (IEEE Int’l Conf. on Joint • EuroS&P (IEEE European Sym-
K n o w l e d ge G r a p h), Ho n g Cloud Computing), virtual posium on Security and Pri-
Kong • MobileCloud (IEEE Int’l Conf. vacy), Vienna, Austria
11 August on Mobile Cloud Computing, 8 September
• IRI (IEEE Int’l Conf. on Infor- Services, and Engineering), • MIPR (IEEE Int’l Conf. on Mul-
mation Reuse and Integration virtual timedia Information Process-
for Data Science), virtual • SCC (IEEE Space Computing ing and Retrieval), Tok yo,
13 August Conf.), virtual Japan
• SmartIoT (IEEE Int’l Conf. on • SMARTCOMP (IEEE Int’l Conf. 10 September
Smar t Internet of Things), on Smart Computing), Irvine, • E W D T S ( I E E E E a s t- W e s t
Jeju, South Korea USA Design & Test Symposium),
16 August • SOSE (IEEE Int’l Conf. on Ser- Batumi, Georgia
• ACSOS (IEEE Int’l Conf. on vice-Oriented System Eng.), 13 September
Autonomic Computing and virtual • BCD (IEEE/ACIS Int’l Conf. on
Self- Or ganizing S ys tems), 25 August Big Data, Cloud Computing,
Washington, DC, USA • TASE (Int’l Symposium on The- and Data Science), Zhuhai,
18 August oretical Aspects of Software China
• HOTI (IEEE Symposium on Eng.), Shanghai, China 20 September
High-Performance Intercon- • AI4I (Int’l Conf. on Artificial
nects), virtual SEPTEMBER Intelligence for Industries),
23 August 1 September Laguna Hills, USA
• AITest (IEEE Int’l Conf. on Arti- • CBI (IEEE Int’l Conf. on Busi- • eScience (IEEE Int’l Conf. on
ficial Intelligence Testing), ness Informatics), virtual eScience), Innsbruck, Austria
virtual 5 September • RE (IEEE Int’l Requirements
• BigDataSer vice (IEEE Int’ l • SERVICES (IEEE World Con- Eng. Conf.), virtual
Conf. on Big Data Comput- gress on Services), Chicago, • TransAI (Int’l Conf. on Trans-
ing Service and Applications), USA disciplinary AI), Laguna Hills,
virtual 7 September USA
• COINS (IEEE Int’l Conf. on • ASYNC (IEEE Int’l Symposium 27 September
Omni-Layer Intelligent Sys- on Asynchronous Circuits • ICSME (IEEE Int’l Conf. on
tems), Barcelona, Spain and Systems), virtual Sof tware Maintenance and
• DAPPS (IEEE Int’l Conf. on • CLUSTER (IEEE Int’l Conf. on Evolution), virtual

58 July 2021 Published by the IEEE Computer Society 2469-7087/21 © 2021 IEEE
OCTOBER Workshop), Washington, D.C., on Workload Characteriza-
1 October USA tion), virtual
• ISPA (IEEE Int’l Symposium on 13 October 15 November
Parallel and Distributed Pro- • FIE (IEEE Frontiers in Educa- • ASE (IEEE/ACM Int’l Conf. on
cessing with Applications), tion Conf.), Lincoln, Nebraska, Automated Sof tware Eng.),
New York, USA USA Melbourne, Australia
4 October • WF-5G (IEEE 5G World Forum), • BigMM (IEEE Int’l Conf. on Mul-
• IC2E (IEEE Int’l Conf. on Cloud Montreal, Canada timedia Big Data), Taichung,
Eng.), San Francisco, USA 16 October Taiwan
• ISMAR (IEEE Int’l Symposium • MICRO (IEEE/ACM Int’l Sym-
on Mixed and Augmented posium on Microarchitecture), DECEMBER
Reality), Bari, Italy Athens, Greece 20 December
• LCN (IEEE Conf. on Local Com- 17 October • MCSoC (IEEE Int’l Sympo -
puter Networks), Edmonton, • ICVRV (IEEE Int’l Conf. on Vir- sium on Embedded Multicore/
Canada tual Reality and Visualization), Many-Core Systems-on-Chip),
• MASS (IEEE Int’ l Conf. on Nanchang, China Singapore
Mobile Ad Hoc and Smart Sys- 18 October
tems), Denver, USA • SecDev (IEEE Secure Develop-
6 October ment Conf.), Atlanta, USA
• DFT (IEEE Int’l Symposium on 21 October
Defect and Fault Tolerance in • IEEE Cloud Summit, Hemp-
VLSI and Nanotechnology Sys- stead, New York, USA
tems), virtual 24 October
10 October • VIS (IEEE Visualization Conf.),
• M O DEL S (AC M/IEEE In t ’ l New Orleans, USA
Conf. on Model Driven Eng. 25 October
Languages and S ystems), • EDOC (IEEE Int’l Enterprise
Fukuoka, Japan Distributed Object Computing
11 October Conf.), Gold Coast, Australia
• ESEM (ACM/IEEE Int’l Sympo-
Learn more
sium on Empirical Software NOVEMBER
Eng. and Measurement), Bari, 2 November about IEEE
Italy • ICNP (IEEE Int’l Conf. on Net- Computer
• ICCV (IEEE/CVF Int’l Conf. on
Computer Vision), Montreal,
work Protocols), Dallas, USA
6 November
Society
Canada • SmartCloud (IEEE Int’l Conf. on conferences
12 October Smart Cloud), Newark, USA
computer.org/conferences
• AIPR (IEEE Applied Imag- 7 November
e r y Pa t t e r n R e c o g n i t i o n • IISWC (IEEE Int’l Symposium
IEEE COMPUTER SOCIETY ELECTION

Volunteer Leadership

Is Vital
Vote by Monday, 20 September at 12PM EDT

www.computer.org/election2021

You might also like