© Distribution of this video is restricted by its owner
Transcript ×
Auto highlight
Font-size
00:02 Uh huh. Yeah. So um don't want to talk about about the

00:16 any questions otherwise on Mp or anything before I. Yeah. Yeah but

00:26 Yeah so well a lot of today I just really want a slice of

00:37 to prospects are and most of the on demo and welcome back projects.

00:46 what about that song? This essentially wow I'm prepared for that sector.

00:53 in terms of the websites at that in a small crime reasons like checking

01:02 so um and a lot of other today is about What's known as one

01:13 Communication in one way or another and about something on this virtual apologists.

01:21 we'll see how far we get. . Uh First thing then um that's

01:30 little bit more of a slide showing idea behind the Sandra C that communication

01:40 they talked about. So just one named the science. The best showing

01:46 are the fact that things are in not synchronized in the sense that um

01:55 and receive can be posted by the processes that can give a tax on

02:02 personally assignment showing that in this case perceiving process. I got to the

02:10 to they seem something before the sending did and in this case sending at

02:17 point also them uh they're both supposed send him and the buffering and so

02:25 a little part of the whole transaction the NPR communication like this takes care

02:33 they're buffering and moving the needle from standing process to the receiving process and

02:41 it stuck into the memory of the process. So kept this line is

02:49 to just show that there's a bunch independent processes are involved in doing this

02:55 . See in the standard send receipt of models. So uh in order

03:09 try to so that means this transaction not uh completely without both sending and

03:17 process is being involved and when it is depends on the progress that the

03:23 processes makes him the completion of the . It's a function of both the

03:30 and receiver. Yeah. And sometimes not necessarily what you want because if

03:40 sending process in this case I wouldn't depend on the outcome of this transaction

03:48 order to proceed and do something And in particular supporting some, it

03:56 down the sending process in terms of it can do. So that farmers

04:01 up with this notion on one side communication And it's strike two kind of

04:10 the illusion other things ahead. Like if you are reading or writing towards

04:16 local memory in this result. And it's important to remember that N.

04:24 . I again was designed for communication independent processes that they're also advocated on

04:34 processors or notes in the cluster. So that means they're totally independent

04:42 Normally there is no chad and in they're always only knows about several commandment

04:49 know about any of. So one the step and this one is and

04:58 the FBI folks came up but this of trying to make part of their

05:08 visible to other processes. So that that memory then there have been declared

05:17 through a little bit that that happens this process can Then another five or

05:24 Yeah, I know that part of memory is accessible to other processes so

05:34 one we call and I guess or to call it the global address space

05:38 that each process still has his private . Yes. And then other parts

05:47 the memory or at the space send to the factory visible. So other

05:54 can be 600 so and this is kind of illustrate their you know that

06:04 can retreat In this case process one and Bridget data from and one of

06:13 other rights that give an example of process to and I just put this

06:19 in the time so it's kind of not the same but it's kind of

06:26 concept to this unified memory that we about trump's it'll be nice to see

06:32 distinct memory that physically memories either on CPU more on this. See if

06:39 and it's not sort of the same or the same address space natively because

06:48 sitting on opposite side of this besides that takes But by pairing these notions

06:56 unified memory, it allows the low routine operating system around that system.

07:03 about both address bases and the program I cannot think of Yeah, Combined

07:11 memories as if they were one part an address based on that the conference

07:17 figure out exactly what to do and not the local memory reference like a

07:21 store operations but it's actually has data to remove over an I. O

07:28 . There are different mechanisms but it the programmer not to have the project

07:33 but I'm so different about this Mhm. So that means that in

07:41 the communication that's true in this case process posted son and then eventually the

07:48 sided part of empty takes care of and basket deposit whatever the process wanted

07:56 send in the memory or their seeding . So and part of it the

08:06 necessary was to try to improve performance one of the aspects in that

08:14 Oh ascend. And that's the right to another process or sending data to

08:19 process can be simply done by this process. As long as that process

08:26 access to the memory of the receiving . So it doesn't need to wait

08:33 the in this case process. Want get to the point where we received

08:39 statement is full, it is okay in the receiving process. Uh huh

08:47 huh. And so typically it is general notion is remote memory access.

08:55 Instead of talking about one sided people often talk about the general concept

09:02 the remote memory actions but that required one sided. That mechanism in order

09:08 it to be usable promises just next few things that so in terms of

09:17 conveniences of using this and as well potential code are using This one side

09:23 communication at some point. So you to come and because we're one of

09:33 things that play there over the summer I can tell you what the outcome

09:38 but what can I do for a bit and this dependence so many cases

09:47 sand received protocol. This kind of in some sense it's about these areas

09:55 you know get some put about can put in some additional burden on the

10:02 . And because in many cases there no employed synchronization and get some puts

10:07 program semantics requires a certain order of . Then it's up to the program

10:13 ensure that actually true. Um so little bit now I'll have to grateful

10:26 the global or public or shared memory the notes. Um so the FBI

10:34 has a few different commands to do . So uh I want to talk

10:46 these fours. So the general term this shared memory across Notes. What

10:57 call the global public but it's shared no as that's nothing to do with

11:03 and Windows but the FBI calls call window. So it's just um memories

11:14 in each nose that is visible to notes or processes such as say

11:23 So that means processes that form some of a group. I think we'll

11:35 about it. And so you have last time that can define collection processes

11:42 to form a group. And then group is also in one of these

11:49 . Is that some of the context allows processes to communicate with each

11:56 So these processes that are in the and then uh each one define what

12:04 of such a space. It allows processes to see. And the then

12:11 use this name of the window as handle. So all the processes that

12:17 to chair part of their memory used same cancel. So that's the thing

12:22 the funds you get to this global against space. And then there are

12:30 few different words are listed on this . That guy um manages physical level

12:38 this place. So it's great alligators great dynamic and allocate shared but slightly

12:46 properties as its chosen this slide and Tony great parties you already have allocated

12:57 and just want to make it then available on the process point of view

13:05 they allocate. That's both things at advocates and makes things available. Other

13:12 and then there's some other trickery of to create to handle the create dynamic

13:17 then with you can then attach and manual regions to the sandals, dynamical

13:27 then there's one except for if you things within and out champ So I

13:33 some examples I guess not tell a bit more in detail but there are

13:38 are but it's essentially the same thing and so many contacts you take appointed

13:47 starting address for a memory region and you define the memory region that is

13:58 interest in a different context. And you define the memory region is by

14:05 account and the data type so you f b I can figure out how

14:10 friendly is that that represented something in of floating points, you know four

14:17 for a single position data type. fights for double position data types,

14:24 type and accounts, you know how memory there is from the storm from

14:30 is the case and then uh you the window name as I said the

14:36 for this uh collection about it in different processes and then they communicated in

14:44 the processors Yes, pretty much. there is also disappointments. That's the

14:55 a enables you to awesome So I'm to do a strike in terms of

15:03 uh the memory is uh collect or . So it's displacement differently.

15:13 And then there's the info thing that a lot of different things. I'm

15:17 going to get into any details but various ways to try um tell NPR

15:26 yes. Yeah. Global address space , can be manager should be managed

15:32 they accept control a little bit how level of optimization in terms of access

15:40 the run consistent. And then and I was very simple example, uh

15:52 uh, when those crates statement on side memories will be allocated and great

16:04 that is visible. Two other processes an end conditions on access to that

16:18 communicators. Np I can't work with . Good night. Yeah, Jonathan's

16:28 previous particularly remarkable and like that and the alligator is similar in the sense

16:41 up that also in the includes the of memory I'm supposed to just making

16:46 accessible and then there's christian out of example where is about memory is not

16:54 allocated on this case. That happens well the same for us. And

17:04 then there's also this dynamic examples to that that's the case. The handles

17:09 hard to access things and uh huh in this example here then it's absolutely

17:19 actually memory chunks to this that respect use the same handle throughout. Can

17:31 change whatever you want to be accessible that window. Yeah. So this

17:45 just some details um, so any or comments you or anyone else,

18:01 those exclusively that but also not to that these bones their electoral statements,

18:09 buy all the conversations Yes. The does not call it any of the

18:15 that they don't know about every Not possible. Yes. So and

18:24 comes back to yes. The fundamentals terms of NPR uh, only the

18:35 has a global picture of what's supposed can happen. So a program I

18:42 number of processes to share something. has to be explicitly stated for each

18:48 and they have to they need to stable from him. one of these

18:53 that should have Yeah, again, they are not necessarily synchronized. So

19:00 doesn't mean that these processes execute this at the same time but before they

19:07 access it, it has to be by the different processes. Right?

19:14 is this local so certainly not Good. He's asking where is the

19:31 the accessible look at it where it's of the local address space in this

19:41 . This process has its home. have the process on different notes.

19:50 physical memory then is in different There's so it's just a question of

20:00 some sense, largely collected. Collective . Each. What part of the

20:07 memory what part of but the starting finish address is can be totally different

20:13 each one of the processes. So no particular six. There's a top

20:19 bottom of memory. Something in a in memory that you define? We

20:25 that the pointed to the starving address the trunk or substrate collection of

20:34 But do you want to be in uh remotely visible at this place Because

20:44 data types is in this thing you have the right data types. So

20:48 means you can not just continuous box memory but point into some studies also

20:58 structure in so if we have to other stuff. Thank you. Well

21:15 so there in telling the story. . So I'm not sure if I

21:27 but just give me an example. Yeah, you know process zero may

21:35 it is just awesome. One variable all yes fights or work. That

21:44 location 100 is what I want to and the other gun do location

21:53 So there's a totally different remote Um, I don't know it

22:03 but I believe there is no um allows you to. I believe so

22:14 correct. And what I believe the of the window need not to be

22:20 same on all the processes in which they're not done. It's up to

22:26 program and to make sure that things go wrong. Well, So what

22:31 saying one man just one fight And process maybe $100. So they may

22:40 different addresses space but since then the , what if that's what you do

22:50 So is no copying involved. It's saying that like when you have a

22:59 computer you have a single other space start from. As you always keep

23:05 of the memory space for itself. it doesn't look too everything. And

23:09 the usable address space start from some and it goes on to history and

23:13 the um and then where where are misallocated that that's just what where the

23:22 ends up is the function of what decided. Uh map things into the

23:31 objects based on their members and that's what then the addresses gets computed.

23:40 when you do a clothing store from components of this generation, it's known

23:47 ? That very relief san Francisco. the second round process process of product

24:00 if he wants us the entire Yeah. So it's you know,

24:05 code is symbolic. So it gets brocade from this process. And then

24:16 compound in combination with the runtime system out word does they lived in this

24:25 ? That's fine. Yeah, but have to make sure them that it

24:33 . Mhm. That it is but in the window that you want

24:40 Sure. So if who processes are than the fact is a fact,

24:50 know, access. It is. , it's a difficult fighting.

24:59 Uh the network is the transport but worst on the runtime system uh tells

25:08 network what to do. Yeah. the members are located on and they

25:20 sometimes also about enforcement. So if have a process to wants to send

25:26 data, I should put some data this one. Yes we are on

25:32 division. We tell me network Okay. And then the NPR interview

25:39 think I just want to figure out at that point that exactly lives at

25:43 physical determine health. This is the not always processes on the that's why

25:55 tastes of the local process manager checks guarantees. Oh they're always on the

26:05 else that communicate with each other and to think that our side. Uh

26:13 . Then depending on loss the extra the call analysis target and this is

26:22 for example levels the internet directing. was um for brian protocol Attackers today

26:31 into that but somehow or other Uh hold on. The accident's hit

26:48 under in Vegas staring. That's so know. And just a little bit

27:10 concept of differences in open empty was designed for share members. It's just

27:17 physical memory. one who always tell about all of the memory and there's

27:24 always my college print edition too. store instructions that comes go we figure

27:30 what to Richard. You can got possessory coffee and a private store have

27:35 private results and everything. You can't it to see there was an additional

27:42 because now there's two different sample spaces to get data from one to the

27:50 and then no one needs to go the special express bus that has his

27:53 protocol how to move there between the spaces and that needs, it needs

28:00 be retrieved. Problems of the memory you put into the are you in

28:07 face moved over this? It's an line following the United Express Protocol and

28:15 receiving and put back so put into on the receiving Sonam. It's additional

28:23 is not just those stories and it gets more complicated because in addition

28:32 the express your protocol then the network card gets passed into the and that's

28:40 the Cinnabon isn't It provides a protocol goes over a bunch of wires into

28:48 it's complicated network it tends to have structure when it comes to faster not

28:55 you know the infant's adopter or as of the water is connected. Who

29:01 ? Well how but it tends to regular structures so that's another layer of

29:07 that is involved in moving data from a M month number two can process

29:15 another. So that all of that put into this. Uh huh.

29:22 terms of M. P I to FBI communications like there and hides all

29:27 that from the user. Uh So I think it was yeah like

29:51 so I'm a little bit more on of this putting yet. Yes.

30:00 there is this put is kind of equivalent of the scent but doesn't require

30:08 receive. So it's just have enough to write in the process memory even

30:15 it's not from the same, Know this one happened. They are in

30:19 same windows on the same process Thank God it's just re for a

30:25 dream and then there are other versions it for advancement. That's the way

30:31 get for the accumulates or camera put accumulate so you can sort of add

30:37 the destination. Um and uh and a couple of other prepared swap

30:44 Hope comment on. So this is picture I guess in terms of the

30:51 operation works well you don't have So it's not sick how much they

30:58 where kind of degree in terms of know the process, I want to

31:05 something town that laws are wow. police process, they want to write

31:11 and we're supposed to go. So the degree of technology,

31:22 Yes. This will not generate that because mhm. Just write things.

31:31 I feel so if we are improving , you won't have to because it's

31:42 right. But to get the same . So in that case the developed

31:48 because The two processes effectively want to data. So I wanted to put

31:56 else. You wanted to get something um I put in gets are the

32:07 independent. Uh the results are very and with all the things actually but

32:16 . So the senator, she's done correct order without deadlock and these and

32:24 . So you don't want to But if you put them both and

32:29 them both. Mm hmm. The in which they are executed is

32:37 Oh, so they have come after things has happened. They love to

32:43 same as the property. Hold it . So that comes back to my

32:50 . It puts a barn bird and the program. And to make sure

32:58 the outcome you want in the Mm hmm. Are they not sensitive

33:05 the order Or if it is sensitive mechanism in there to make sure at

33:13 point when you need the results, know what order the top.

33:28 so many things. So this is to get the operation what it

33:32 And the statement that's, you this is a sometimes and I have

33:39 example. It's on fire. So sometimes you may want to combine the

33:52 of the ad. Set to values then you wanted to store it in

33:56 of the locations Of the two Three added up. You can do

34:02 PSB and separated and see. And may be what you want but maybe

34:06 perfect defined to update days. have everyone pay for speech.

34:15 So sometimes you don't necessarily need it a separate thing. You just want

34:18 add added by some numbers and it's fine to use one of the radio

34:26 as the final results. We don't to override. Put that against what

34:34 you next. Yeah I think so are thank you. Uh So there

34:45 are depending upon what they want to is call the gamma rays um reduces

34:51 number of communication actions or it's more cot conservative in terms of memory use

34:59 it uses uh yet to put with that option so if it's enough and

35:09 this is sometimes in the parents walked is another thing here to processes involved

35:15 depending on the outcome here on this for now. Yeah and except for

35:22 and coming back to the ordering we discussed any questions on those comments have

35:30 comment like doing puts and gets so can the assembly process can for the

35:38 there will be a memory of our quality and profitability right? Not necessarily

35:45 . Yeah but while doing that yet has to be from telephone. Can

35:52 get from focus on wheels? And even if you put some dope

35:57 them I have to write it into global memory on the process cannot put

36:02 the price. Good point. So when it comes to put destination

36:11 to be global or share I can't you have to receive it because it's

36:17 else and you can it can also right into your local memory. That's

36:21 that's something the requesting process control. this is kind of water some already

36:32 responding to these questions. Uh This Children's picture instead of size again

36:40 shows that these two quotes on which succeeds first. Uh huh. Oh

36:47 it's a union. It's a cold sending process. No what is your

36:59 B But they may not be received the same order as the fact.

37:09 for sending more like possible. Yeah there are many things or even yeah

37:17 first is no guarantee that the operating and an effort phase potentially in one

37:26 . And then there's the question of work because the member of committee members

37:32 source and destination and they made a of different student effort. So when

37:39 arrive at the destination something that defending so exciting. Okay quarters. And

37:52 other thing is of interest also said they could get and uh I have

38:00 it either but when it comes to there um accumulation sickness to the same

38:19 farms that are order. So. And then questions on that. So

38:42 yeah they for this now on side not the most fantastic the organization part

38:56 are different ways of that's a fine or start and stuff of even events

39:11 which things are simple and I think easy to the gun show some pictures

39:17 how that happened. So that's going this basis. Defense command start this

39:25 in which things. Uh huh. Act in terms of the one side

39:31 complication. Oh yeah this property stand to the other France command within those

39:40 things uh have the push to get of the process participated in this point

39:53 this. Um So the fence and is that kind of global within the

40:07 of processes for which this window Obama. Huh. Another sort flexible

40:18 only targets focus on the windows for processes. Problem our artisans process that

40:31 see feminist circles so the students the on the target suppose statements that

40:43 Mhm. Starting weight. Yeah. hand cars look after it starts at

40:55 on the origins of the next and guess they can happen if they find

41:05 and then there's way of uh banking of preparing on the post starts

41:13 Mhm second forever and then there is one more that is and totally in

41:23 spirit of it's a memory where only process somewhat. Yes. Uh huh

41:38 need the participation of the process someone the other process target processes passing this

41:49 . Process of originally requested the active but the animal is not constipated and

41:55 it does fill out and unload something in central Square so there is a

42:02 lot of flexibility to manage uh this one size in communication actions. Thanks

42:13 . This is yes you get an of the flexibility in NPR uh and

42:22 I want to do it for a and it's not going to be in

42:24 assignments for FBI. Uh huh. this so that further discussion about this

42:37 under it quickly since it's kind of of more than anything else expected to

42:45 in this. So what next I to talk about? Yes so um

42:57 of these things or something. Data I was produced two years ago.

43:05 not but there's still climbing stand on of these past few years credit company

43:13 do this and religion different persons Yeah. Hold on anyone. Uh

43:25 Stop once like the FBI working under such a movement seeing on the political

43:37 to escape. Uh huh. Uh celebrate. Oh starting the access

43:50 llama for example access that is the science work in the right on the

43:59 so it steps onto the time Uh huh. Once I did.

44:06 right. Yeah. Oh for protecting prayer is is this item it's the

44:18 place. Ah two sided. Still significant factors of small my

44:30 The launch and massive science the science part sending the pain also you shouldn't

44:38 that takes it over In about two . Uh huh wow, stable and

44:48 other marks. Okay. Yes. moment. Oh it's it's different and

45:02 they need different kinds of experiments in of groups and for certainly messages.

45:11 I said so these networks again is honest talked about the format of an

45:20 message, right? They call an but this was a header that had

45:25 the information about source and destination and it comes to empty. I also

45:32 that allows the receiving process difficult if receives many messages from the same

45:38 Which messages system, what I'm supposed do with this. Uh and then

45:43 about the size of the table in to allocate memory. Oh so there

45:51 packet overhead and then there's a communication that then you take the empty the

46:00 in the center and stick to IT message that has its overhead. How

46:07 write and email messages and depending upon the protocol is. Um that those

46:20 from their behavior. Mhm. Uh different amounts of overhead and different uh

46:31 protocols and for these machines that was . I'm sure it was not provided

46:40 dance only colonization. Um So this just more of these sets of slides

46:50 you can look at it as the and other things. Yeah. So

46:57 going to talk to that's coming back Kobe example but before that the women

47:05 share move. It's more about I'm trying to do Uh one sided

47:13 that Uh huh Oh the other side for themselves basically doing these uh sense

47:23 computation. Yeah. Call it was with it. Is that president?

47:32 , let's just single there pick up down just how you obligations on both

47:42 friends in that case we he was framework called open marriages very similar to

47:53 but it only gets confused one side communications and allows you to have distributed

48:00 across proposed processes and the complexities where trying to deal with one was in

48:09 of program abilities of even though as as you've seen there's quite a few

48:15 calls that you need to performance. believe these one sided communication of designing

48:22 more than five for companies. So show program ability was to have as

48:28 amount of uh, as on the motorcycle And the massive obligations part basically

48:37 them a distributed their respective project. gonna go back to tackle all these

48:43 of details about it. And in of the rendering system that we were

48:49 to make sure that however we distribute matrices, our brains are different process

48:57 we should use the one sided computations the ascendant received, they have a

49:05 amount of relays in terms of synchronization . You think about having millions of

49:13 on a constant and those small delays not big ridiculous seriously market in that

49:21 we used is one side of communications women that are running already. I'll

49:25 into beetles in such a, such way that you have to implement us

49:30 amount of super visitation policy in the and still get the characters. So

49:38 was more portrayal that thing out. . That nature systems of that programmer

49:44 have to worry about any interest you understand can access the matrix just like

49:49 models. Hi jay Dixon. But run down what happens these data movement

49:57 and we know that pitch matrix um blog decides on which process and then

50:04 having complications process the first performance. you did a big difference in terms

50:18 . Right. Yes. Right. how they uh I didn't get tested

50:30 I only worked with general burgers. bubble machines of them promise to

50:40 Residents are still believe people alive. a random favor. Oh But in

50:47 Madou Observer was more than 10 Yes . Speaking. Right come back.

51:00 . Oh okay. And probably one No but the difference different ways of

51:09 it. Oh Oh it was almost something Background 65 600 Yes we do

51:20 . It was about how you perform so one bottleneck that I found out

51:27 was similar to what you guys have . Are there uh Iran memory within

51:32 experiments when people demonstrated Uh data transfers the memory of the old one is

51:40 that was superb performance by this and transport that's it was one of the

51:45 next that I am sorry I just communications not realizing that under the hood

51:52 communications are so the solution I was simple that agreement. It was the

51:59 copies. That's right. That they're to convenience but and then send it

52:04 across the I. O channels back concert. Uh so there is about

52:10 times ask me that there was All right, uh huh. So

52:19 point is it's not just 100% many . It's it's best that making it

52:25 or impossible. So right. That's just to get the scale. What's

52:34 impact on me that it's not small that's one of the reasons that we

52:40 talking about. It's about cardio the data sets that the signs of

52:47 that is quite a matter is growing that you're doing FBI. So you're

52:54 of scaling the multiple loans and you have that much work otherwise. The

53:00 of the ramifications questions for you. that philosophy, get the real working

53:16 example of this case is over understandable for the record should be potentially support

53:31 of these boats are generally anyway, coming back to jacoby that it is

53:38 some point in the past now in context of noon. So I mean

53:44 problem this takes to the, to examples of stuff that's the regular mess

53:54 that they want to solve this equation uh thinking on temperature or pressure or

54:01 like that in the square. So order to do then eh cluster setting

54:11 you do a core of uh the and something something that each one of

54:18 processes that the source. That's all processes can be a little bit something

54:30 and then it was still supposed treated a one problem. So one thing

54:37 high potential. That's all right. , that's a nice it's just uh

54:47 on that. Right? But apart in the notes here on the boundary

54:54 don't have a body. Uh The boss's saw that happens in

55:02 The data from the north. Mhm. It's not on here uh

55:18 to go the boundary data. So that to do something this song.

55:27 about that already been bothered remarks and uh you know just this is Oklahoma

55:38 up in the government from human dating fellow and just you know this process

55:47 order to get the exchange of So that's again my exchange data and

55:52 can do it by send receive so can do foods that gets So this

55:59 is using put and gaps. So is best to showing that what the

56:05 principles you need to advocate. This something mean but often out of the

56:13 you need to receive a call the is and the simple where you're that

56:20 be remembered for. So so I that I'm putting on my sword officers

56:30 last member of parliament about please. simplistic. It's just allocation of memory

56:35 what you want to do. And have regular access stuff You don't put

56:42 society separate the rain expected. It be easy. And his reference in

56:51 of record somewhere else. Younger Yes. And it's sort of the

57:00 data and that computation phase is Mhm So uh so this just shows

57:12 what? Mhm. The green part that old? Oh yeah, so

57:26 goodbye and more than making the That's fine. It's all we'll be

57:35 as the global accessible for us and end up doing this frank saw

57:48 these buckets are orange and buckets for , processes. Uh the other ones

57:56 agreement that's uh the local owner of uh Yeah. Mhm Take another

58:12 So then they end up doing something this. Oh, this process.

58:21 is often a fun thing to write the girl. Yeah, I'm

58:27 opposite. So this is uh to use the get or in this case

58:35 the foot part and everyone can be and in fact we get the sanctions

58:43 in this case uh whenever the puts completed that you have the data and

58:48 you can do the fight consensual computation locally in each one of the

58:54 And so here is kind of Uh This FBI come together and uh something

59:05 . What 2nd phone for them but about dinner type of sausage. Not

59:16 this. Hopefully computation on a regular . That's a good way defining

59:24 NPR graphics. That regime so There is a our thoughts can do

59:31 and up and down vulgar. It's the next life and just to keep

59:42 Uh huh. Where we follow the and another department. And you have

59:51 basically for the computation part allocation In nice two D array where the loggers

59:57 included. But when it comes to communication, another complication with to figure

60:04 how to retrieve the border, the out of his hand, difficult through

60:11 race. So, so both administration use supporting and how to identify uh

60:23 summaries that defines the boundaries and as we talked about they got back.

60:30 , So it's free, yes, direction. So female, even in

60:44 directions, someone you want to start whole lot of straight up thoughts who

60:53 this element of this uh this part some doctors. So that's why actually

61:03 it is even for the left on other defense people die. And that's

61:11 happened with the idea to attack Yeah, I'm not just a better

61:17 and collecting these items before standing at x 1 instead of this. You

61:26 . This family to practice the absolute . You know, the number of

61:32 . But recent confrontation part will be himself Front of one element. This

61:40 so Oh, yes. At some . I will not a week.

61:52 calls. Yeah. So maybe next . So any questions on this or

62:00 to put fingers and also the right to do in this case some nights

62:06 regular access but in terms of Mhm. So this this that well

62:24 like the broadcast no broadcast would be um Oh and please go on sunday

62:37 all the other this is all get to build upon This. one says

62:45 process, one source, one business there's a hold up mm hmm.

62:54 they don't have to have them So the extent to which they after

63:03 humble and receive the effort. Business , get some data wow follows.

63:17 each transaction what what uh many all of this process. That sounds

63:28 1001 time they are trying to set time in the all yes in principle

63:38 this statement and then it's up to the capability of the system to resolve

63:47 can try to get as much happened quickly as possible. But all of

63:52 is point to point this process. . Uh huh. So that's not

64:14 or uh huh uh huh. You to uh uh some biscuits do the

64:30 um Yes, we're in a state the product for instance the first rule

64:43 time column. And so I do is on the one of the scientific

64:53 the first gold first phone that keeps insults after the transformer. Um So

65:03 so in this case you modify this . This word that is going to

65:12 park a minute product on the first back the first column. Uh So

65:21 , it's eventually gone and up and opportunity for enforcement a good at

65:29 Next time around there was interaction The second box in the first

65:35 Among devise this value and other states attendance. Oh, but that's why

65:45 need the front and back. Big , you sort of what accumulates accumulates

65:51 your product in the number of of . And at the same time as

65:57 process embarked on the first roll And 2nd part. So this is the

66:05 element in the first row occupied the element, events and the part of

66:12 product or is it? Oh, is to do the product and my

66:22 and accumulate in the rock face. you said, and this takes the

66:26 plots, baseball and also they're fishing biking. So it's just showing

66:37 As I mentioned, sometimes you the , you know, forget that accumulated

66:43 such uh, what the result Yeah, so okay, so this

66:52 potentially then, well, maybe next when trump's bombing this makes responsible I

66:59 they're called the example and there's this bit of advice and want to use

67:08 simply thing as I said, one more burden on the programmer to make

67:12 that, um, since there is implied ordering will get some puts general

67:20 , but it avoids a lot of and that process is kind of operate

67:26 a synchronously and make the progress that make put out uh communicated now.

67:35 the next. I don't think And NPR used a lot of

67:43 Right? Uh for two reasons. is for convenience of a programmer and

67:53 second is for automatic processes off too process ORs so NP has this concept

68:04 virtue, anthropologist and you can two 2 structures basically one is uh huh

68:14 of whatever number of dimensions you want then they live on is what they

68:18 graphs. So yes. Um and was just this example infrastructures from engineering

68:32 amputations were um in order to be airport was driving time. That's all

68:45 car locks the space and are I think the supplement. Uh huh

68:59 of the members are used for college problem economies. Welcome to approximate.

69:08 huh differential equations uh continues differential operated . The tax system. Oh,

69:20 the truth the neighborhood commented. We yes. And all of a sudden

69:30 think that we just princess ha It's the accent uh respected and efforts

69:41 to be looking for performance and the innovative resistance. So that's why a

69:51 of uh all the applications, you regular demands that two and three D

70:00 . So that's what's very convenient. Comey example is what we do also

70:07 to the left neighboring east to west , north and south neighbor. So

70:12 you basically think of these processes like was on the side. It's a

70:19 dimensional grid of processes. And if have been a network that effectively coastal

70:28 to the emotions very well, then don't want to have an arbitrary mapping

70:33 these processes but they want to have mapping such that it happened to me

70:37 exactly the physical thing and land. that's just neighbor communication in the actual

70:42 as well as civil service. So that's one of the purposes of having

70:49 apologists. Oh that's there is. what is this petition? I think

71:03 you can define and uh huh This great. That's the but there's not

71:14 , one of the arguments that tells how many dimensions of what uh

71:20 I didn't create. I want to it the beans. Man FBI tried

71:27 figure out how the fact that the of notes that you have in the

71:33 processes. Thanks processes and two something is usually what you want in terms

71:46 . To the Bassett sees topics will in the square. You know what

71:55 and you want something to this so can specify, you know the length

72:02 the axis that you want to come the processes. That's the past.

72:08 him and the other figures about their there's a corresponding things. Yeah.

72:17 the ranch and petition grip uh report back to the plantation grid. They're

72:29 against them because sometimes um one wants best to do the ship left and

72:39 or something. Right. So the in terms of the petition and decide

72:46 along with dimension you want to do shift that you want to shift.

72:54 I'll see you for help. So the other thing you can define

73:00 . So here is an example of china. Yes. Um Yeah one

73:11 that is the original process. 100 12 fire your face. So oh

73:22 it's part of the sport and they a cuba B great. Uh Right

73:32 strap of course what you say. single single and get on. So

73:40 it. Each instructor and then so here. Two dimensions. This is

73:52 three instances instance 33 along the Uh Well now the second dimension.

74:09 so here the wrap around what happened stick there's a restaurant, right?

74:21 so it's uh and specify these things terms of, oh are you playing

74:30 grits? Yeah. So I guess example as I said it and then

74:42 I do before. So I understand big part of it. I want

74:47 dimensions and that's the thing or The prosecution. Uh My number is

74:58 with us. We'll put the dimensions the prime numbers stand back for

75:04 So but the deficit activities on right Advance that half of the three

75:13 imax dr So these are all Well we're looking for this.

75:28 The contract is about to practice one other factors up right smiles so it

75:37 going to work. So I understand it's just an example when you try

75:42 get NPR two, did you All right. And there is some

75:52 examples here. Some examples to do to one of an example then Oh

76:03 Graph one Someone has to tell So the facts of this providence independent

76:11 of the policy that so if you have a regular kind of underlying best

76:17 have a problem for a graph like . So you have a relationship

76:24 Maybe I'm doing it many times to the aircraft. And so NPR that

76:31 of this way for them. Uh . Doctors say. So we get

76:41 know them to God to specify in a half degrees and then you specify

76:48 target for the outcome. So in case uh zero. And this

76:55 Uh Huh. I don't get it land on no. Up with the

77:06 process one and 3 edges coming That's it. He's waiting for you

77:15 but eventually built the structure. So mechanism this time the only thing you

77:23 to that's it sacrificing animals and you hurt yourself where you coming from several

77:32 yesterday. Yes and then S. . I contracted this best job once

77:40 knows the structure the map it onto actual physical network that connects in order

77:47 order to try to also they make communication as efficient as possible. And

77:54 the program americans use. No, is after station the right moment,

78:04 like with relationships and report in the and residents of so. So it

78:13 sometimes it was sort of conceptual basis the cold, but it also gives

78:19 to NPR in their ransom system for to map things onto the physical.

78:27 , no part. And we have take my time. Well,

78:36 maybe the more human comments. Thank you. Yes. Mm

79:00 Um.

-
+