Computer Technology Assessing the Evolution Thesis

Total Length: 876 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

The real-time integration to memory management that would lead to rapid advanced in superscalar memory management made possible with RISC-based microprocessors and memory however continued to be driven by IBM and their partners working in conjunction with each other on new developments (Biswas, Carley, Simpson, Middha, Barua, 2006).

Implications of RISC Development on Memory Management Advances

Over the first twenty five years of RISC processor and memory development the key lessons learned in processor-to-memory integration led to breakthroughs including how to make multithreading for 32-bit and higher bit order applications collaborate in memory, how to minimize cycle time and increase cache memory predictability over time (Biswas, Carley, Simpson, Middha, Barua, 2006). Cycle times and cache memory became and still are the two most monitored key performance indicators (KPIs) of system performance in systems due to the progression made in RISC-to-memory integration (Vanhaverbeke, Noorderhaven, 2001). Superscalar memories today reflect the decades of lessons learned with from RISC-based microprocessor development, specifically how to translate multiple memory calls into a single command.

Stuck Writing Your "Computer Technology Assessing the Evolution" Thesis?

Superscalar and pipelining approaches to memory management capitalize on reduced instruction sets of optimize performance by minimizing interrupt calls. The lessons learned from RISC processors are today also reflected in virtualization algorithms used for managing complexes or segments of servers used for running Google and other search-intensive applications as well. Virtualization also has made real-time memory management possible for creating multitenant-based Software-as-a-Service (SaaS) applications (Biswas, Carley, Simpson, Middha, Barua, 2006). The use of RISC-based approaches to managing memory and the progression from superscalar and pre-emptive multitasking and virtualization of memory management algorithms (Biswas, Carley, Simpson, Middha, Barua, 2006) has also led to advances in security of systems and memory as well. Multi-threaded applications based on the Win32 Application Programming Interface (API) for example have significant security advantages over previous generation shared or collative approaches to managing memory. The progression to multithreaded applications has led to significantly greater levels of security as a result (Biswas, Carley, Simpson, Middha, Barua, 2006)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Technology Assessing The Evolution" (2010, February 27) Retrieved June 28, 2025, from
https://www.aceyourpaper.com/essays/computer-technology-assessing-evolution-14706

Latest MLA Format (8th edition)

Copy Reference
"Computer Technology Assessing The Evolution" 27 February 2010. Web.28 June. 2025. <
https://www.aceyourpaper.com/essays/computer-technology-assessing-evolution-14706>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Technology Assessing The Evolution", 27 February 2010, Accessed.28 June. 2025,
https://www.aceyourpaper.com/essays/computer-technology-assessing-evolution-14706