Intended for the world of finance, IBM’s Telum is a processor that executes AI algorithms directly at the heart of chips to reduce latency and secure data. This architecture makes it possible to detect fraud right at the time it is committed.
You will also be interested
[EN VIDÉO] Cyber espionage: what are the threats? Interference with elections, theft of industrial data, hacking of military systems… Cyber espionage has been on the rise over the past two decades.
There are processors versatile, those dedicated to games and graphic display, or those designed for supercomputers. There are also those who are specifically dedicated to the world of finance. It is for this sector thatIBM specially designed the Weapon. Unveiled at the conference annual Hot Chips which has just been held in Silicon Valley in the United States, this chip on which IBM had been planking for three years, is doped withHE. In addition to managing transactions, it is designed to block any attempt to fraud in real time. The Telum is based on a 16-core chip, accumulating 22 billion transistors, all engraved in 7 nm, against 14 previously. These are 32 chips of these chips, enclosing 512 cores and 8 GB of cache memory, which are assembled on a mainframe to constitute the processor.
For finance, this is not the time to computing power that matters, but rather the reduction of latency and security. This last criterion is the strong point of Telum, since all the data transport circuits are encrypted. On the latency side, the Telum – which in Latin means javelin – can carry out tens of thousands of banking transactions every second.
Minimum latency and maximum security
To support and accelerate these missions, an AI-driven coprocessor is at the helm in each chip. It avoids wasting time by processing data locally and without moving to strengthen the security. To achieve this, each core has 32 MB of cache (L2). There is a cumulative 256 GB of L3 cache and 2 GB of L4 cache. It is in part thanks to this arsenal of memory that the magic of real time can take place.
It is therefore above all at the level of its particular architecture that the IBM chip differs from everything that is done on the market of processors. And that’s why this chip should give hackers a hard time. At IBM, this architecture is called Z since it is only reserved for confidential customers. Customers who want to make 100,000 transactions per second, while maintaining a latency below a millisecond for security control.
It must be said that at the level of frauds, the year 2020 was a hecatomb for the financial sector. They amounted to more than 3.3 billion dollars, against 1.8 billion in 2019. IBM and its customers rely heavily on Telum to reduce the bill. The manufacturer is banking on the first half of 2022 to market its first Z system, based on this Telum.
Interested in what you just read?
.