Servers with chips based on the ISA RISC-V could arrive soon ...

sifive chip

The CEO of SiFive says that in 5 years would come the first servers based on the ISA open-source RISC-V. The new open instruction set architecture has been gaining traction and fame lately. Even from Europe they have noticed it as we already commented on LxA. And it is not surprising that they will soon reach mobile devices to replace ARM and also servers and HPC in general.

The RISC-type ISA is quite well adapted to the new terms and it is modular so you can add or remove instruction modules as needed. This way you can optimize the chips and prevent something similar to x86 from happening with backward compatibility. That they are not only CISC instructions, but they already total more than 1300 instructions, many of them that are no longer used or do not make sense for modern software ...

Naveed Sherwani, CEO of SiFive, has been in charge of predicting that statement. Although perhaps they could arrive even earlier. In fact, he said long ago that it was 5 years before the first tablets and smartphones with RISC-V arrived and about 10 years to see the first servers with this ISA. But now the first figure has dropped to 2 years for mobile devices, and 5 for HPC.

Good news. A ISA open-source, a free operating system such as GNU / Linux, projects such as CoreBoot and LinuxBoot for servers and supercomputers, ... the truth is that the future seems more "open" than ever in terms of technology, although there is still a lot of work to be done and many things to develop and improve. What is certain is that the vulnerabilities detected in the chips of Intel, ARM and others, have helped a lot to give even more echo to RISC-V.


The content of the article adheres to our principles of editorial ethics. To report an error click here!.

Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.