• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

The Weird, the Small, and the Uncontrollable: Redefining the Frontiers of Computing

By Lori Cameron

By Lori Cameron on
August 28, 2017

light streaming through tunnellight streaming through tunnel

Torturing the Silicon: Stick With CMOS Technology or Try Something Better?

Now that Moore’s Law is grinding down, researchers are looking for the kind of revolutionary innovation that will go far beyond the incremental advances in semi-conductor technology that have been made over the past 40 years.

Christof Teuscher of Portland State University—who authored “The Weird, the Small, and the Uncontrollable: Redefining the Frontiers of Computing” (login required for full text)—believes developers need to stop “torturing the silicon to do what we want” and find a better way.

He writes, “One solution path is to use an innovative combination of novel devices, computational paradigms, and architectures to create a new information-processing technology that could go beyond Moore’s Law.”

Read article (login required for full text)

What does this mean? Some of these new frontiers will include neural networks—computers built using the human brain as a model. Says Teuscher, “Neural networks, particularly deep-learning networks, are seeing an impressive revival.”

Related research on Moore's Law in the Computer Society Digital Library

Login may be required to full text.

  • Moore's Law at Fifty
  • Computing beyond Moore's Law
  • The End of Moore's Law
  • The Software behind Moore's Law
  • What's Next? [The end of Moore's law]
  • It's Time to Redefine Moore's Law Again


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
CS Juniors: ChiTech Discovery Days
CS Juniors: ChiTech Discovery Days
CV Template
CV Template
Read Next

Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech

Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students

Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights

CS Juniors: ChiTech Discovery Days

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter