Non-Uniform Memory Access

Non-Uniform Memory Access (NUMA) is a computer memory design used in multiprocessing, where the memory access time depends on the memory location relative to a processor. Under NUMA, a processor can access its own local memory faster than non-local memory, that is, memory local to another processor or memory shared between processors.

NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP) architectures. Their commercial development came in work by Burroughs (later Unisys), Convex Computer (later Hewlett-Packard), Honeywell Information Systems Italy (HISI) (later Groupe Bull), Silicon Graphics (later Silicon Graphics International), Sequent Computer Systems (later IBM), Data General (later EMC) and Digital (later Compaq, now HP) during the 1990s. Techniques developed by these companies later featured in a variety of Unix-like operating systems, and somewhat in Windows NT.

The first commercial implementation of a NUMA-based Unix system was the Symmetrical Multi Processing XPS-100 family of servers, designed by Dan Gielan of VAST Corporation for Honeywell Information Systems Italy. The tremendous success of the architecture propelled HISI to the #1 spot of Unix vendors in Europe.

Read more about Non-Uniform Memory Access:  Basic Concept, Cache Coherent NUMA (ccNUMA), NUMA Vs. Cluster Computing

Famous quotes containing the words memory and/or access:

    Language was not powerful enough to describe the infant phenomenon. “I’ll tell you what, sir,” he said; “the talent of this child is not to be imagined. She must be seen, sir—seen—to be ever so faintly appreciated.”... The infant phenomenon, though of short stature, had a comparatively aged countenance, and had moreover been precisely the same age—not perhaps to the full extent of the memory of the oldest inhabitant, but certainly for five good years.
    Charles Dickens (1812–1870)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)