Total Compute: A Holistic Approach to SoC Design
To meet future market demands, digital experiences must become more interactive, intuitive, and immersive. But without significant changes to current SoC design methodologies, that is nearly impossible. The Arm Total Compute strategy ensures that compute platforms can seamlessly and securely handle tomorrow’s workloads as new devices, use cases, and advanced apps proliferate.
The Three Pillars of Total Compute
All the performance, efficiency, and AI capabilities required for the next generation of devices.
Defense-in-depth for built-in, multilayered protection across the entire ecosystem.
Improved accessibility and increased performance across software and tools.
Maximize Compute Performance
The complexity of new devices, apps, and experiences requires increasing compute performance in a similar, if not reduced power envelope. Total Compute evaluates the entire system to identify opportunities to increase performance with minimal impact to the energy and area required.
Five ways to accelerate performance:
- Evaluate performance across the whole system rather than on individual components.
- Analyze how interconnecting data and compute are best deployed between IP blocks and compute domains.
- Optimize workloads on devices.
- Develop each IP block with a common architectural approach for SoC performance, efficiency, and data exchange.
- Ensure all components work together seamlessly for first-rate performance and efficiency.
Bolster Security Through a Multilayered Solution
To address increasingly sophisticated attacks, security must evolve from point products to multilayered solutions that cooperate and communicate across the system. Security must also be a fundamental element, built into the core of every device and extended to hardware, firmware, software, operating systems, apps, and cloud services.
Four ways to improve software, firmware, and hardware security:
- Standardized Platform Security: Establish device platform trust for apps and cloud services through standards and consistent implementations.
- Strengthen compute security: Use Memory Tagging Extension (MTE) to strengthen software resilience to attacks.
- Deploy an isolation architecture: Sandbox trusted applications, segregate secure code and user data.
- Ensure interconnectivity security: Secure multiple concurrent processes running on CPUs, GPUs, and NPUs without restricting their ability to interconnect.
Improve Developer Access
Total Compute provides frameworks for programming, analyzing, and debugging across all IP, including CPUs, GPUs, and NPUs. This reduces the number of tools and development processes, improves programmability across all compute domains for a seamless developer experience, and reduces costs and time-to-market.
Five ways to unleash developer potential:
- Create easy, efficient app development processes that remove the need for tools optimized for each architecture or various, multiple discrete IP blocks.
- Give developers access to high-compute performance and allow them to conduct full-system performance analyses for all workloads.
- Help developers build more complex, performant apps through technologies, software, and tools that enable pre-shipment testing, in-field capabilities, and faster debug.
- Provide software frameworks and compute libraries, such as Arm NN, to improve performance across compute domains.
- Ease deployment across platforms through more effective security features.
Second-Generation Arm Total Compute Solutions
Learn how to bring mobile experiences to life with Arm's second-generation Total Compute Solutions (TCS22). TCS22 features the latest Arm v9 CPUs and Mali GPUs, the new flagship GPU Immortalis-G715, Arm System IP and interconnect technologies, Cortex-M and Cortex-R CPUs, physical IP, software, tools, and standards.