The Aladdin Approach to Accelerator Design and Modeling

Total Page:16

File Type:pdf, Size:1020Kb

The Aladdin Approach to Accelerator Design and Modeling ................................................................................................................................................................................................................. THE ALADDIN APPROACH TO ACCELERATOR DESIGN AND MODELING ................................................................................................................................................................................................................. THE AUTHORS DEVELOPED ALADDIN, APRE-RTL, POWER-PERFORMANCE ACCELERATOR MODELING FRAMEWORK AND DEMONSTRATED ITS APPLICATION TO SYSTEM-ON-CHIP (SOC) SIMULATION.ALADDIN ESTIMATES PERFORMANCE, POWER, AND AREA OF ACCELERATORS WITHIN 0.9, 4.9, AND 6.6 PERCENT WITH RESPECT TO REGISTER- TRANSFER LEVEL (RTL) IMPLEMENTATIONS.INTEGRATED WITH ARCHITECTURE-LEVEL GENERAL-PURPOSE CORE AND MEMORY HIERARCHY SIMULATORS,ALADDIN PROVIDES A FAST BUT ACCURATE WAY TO MODEL ACCELERATORS’ POWER AND PERFORMANCE IN AN SOC ENVIRONMENT. ......As we near the end of Dennard 2). The natural evolution of this trend leads to scaling, traditional performance and power agrowingvolumeanddiversity of customized scaling benefits based on technology improve- accelerators in future heterogeneous architec- ments no longer exist. At the same time, tures ranging from mobile SoCs to high-per- transistor density improvements continue, formance servers (Figure 3). To thoroughly resulting in the dark silicon problem, wherein evaluate such architectures, designers must chips have more transistors than a system can perform large design space exploration to Yakun Sophia Shao fullypoweratanypointintime.1 To over- understand the tradeoffs across the entire sys- come these challenges, application-specific tem, which is currently infeasible due to the Brandon Reagen hardware acceleration has surfaced as a prom- lack of a fast simulation infrastructure for ising approach because it delivers orders of accelerator-centric systems. Gu-Yeon Wei magnitude performance and energy benefits Computer architects have long been compared to general-purpose solutions. Anal- developing and using high-level power and David Brooks ysis of die photos (http://vlsiarch.eecs.harvard. performance simulation tools for general- edu/accelerators/die-photo-analysis) from purpose cores and GPUs. In contrast, current Harvard University Apple’s A6 (iPhone 5), A7 (iPhone 5s), and accelerator-related research relies primarily A8(iPhone6)systemsonchips(SoCs)shows on register-transfer level (RTL) implementa- that more than half of the die area is dedicated tions, a tedious and time-consuming process. to blocks that are neither CPUs nor GPUs, It takes hours, if not days, to generate and but rather specialized IP blocks (see Figure 1). simulate RTL and then synthesize it into We also observe a consistent trend of an logic to estimate the power and performance increasing number of specialized IP blocks of a single accelerator design. This low-level, acrossgenerationsofApple’sSoCs(seeFigure RTL-centric infrastructure cannot support ....................................................... 58 Published by the IEEE Computer Society 0272-1732/15/$31.00 c 2015 IEEE CPU GPU Others 14% 16% 18% 18% 22% 22% 66% 60% 64% Apple A6 Apple A7 Apple A8 (a) (b) (c) Figure 1. Die area breakdown of Apple’s systems on chips (SoCs). (a) A6 (iPhone 5), (b) A7 (iPhone 5s), and (c) A8 (iPhone 6). More than half of the die area is dedicated to specialized IP blocks. large architecture-level design space explora- tion, which is required to navigate the vast 30 parameter space governing the interactions between general-purpose cores, accelerators, and shared resources, including cache hierar- 25 chies and on-chip networks. Hence, there is a clear need for a fast, high-level design tool to 20 enable broad design space exploration for next-generation customized architectures. In this article, we present Aladdin, a pre- 15 RTL, power-performance simulator designed to enable rapid design space exploration for 10 accelerator-centric systems. Aladdin takes No. of specialized IP blocks high-level language descriptions of algorithms as inputs and uses dynamic data dependence 5 graphs (DDDG) as a representation of an accelerator without having to generate RTL. 0 Starting with an unconstrained program A4 A5 A6 A7 A8 DDDG, which corresponds to an initial rep- resentation of accelerator hardware, Aladdin applies optimizations as well as constraints to Figure 2. Number of specialized IP blocks across generations of Apple’s the graph to create a realistic model of acceler- SoCs. We see a consistent increase in the number of blocks. ator activity. We rigorously validated Aladdin against RTL implementations of accelerators from both handwritten Verilog and a com- suite called SHOC.5 Our results show that mercial high-level synthesis (HLS) tool for Aladdin can model performance within 0.9 various applications, including accelerators in percent, power within 4.9 percent, and area Memcached,2 HARP,3 NPU,4 and a com- within 6.6 percent compared to accelerator monly used throughput-oriented benchmark designs generated by traditional RTL flows. In ............................................................. MAY/JUNE 2015 59 .............................................................................................................................................................................................. TOP PICKS Little Little Big core Private L1$/ core core scratchpad Private L1$ Private L1$ Private L1$ reg_a reg_b Shared LLC and NoC GPGPU Accelerator- specific datapath Application-specific accelerators Figure 3. Future heterogeneous architecture will include a large number of customized accelerators. Large design space exploration is needed to design such architecture. addition, Aladdin provides these estimates Accelerator design flow more than 100 times faster. The current accelerator design flow Aladdin captures accelerator design trade- requires multiple CAD tools, which is inher- offs, enabling new architectural research direc- ently tedious and time-consuming. The proc- tions in heterogeneous systems comprising ess starts with a high-level description of an general-purpose cores, accelerators, and a algorithm; then, designers either manually shared memory hierarchy. We demonstrated implement the algorithm in RTL or use HLS this capability by integrating Aladdin with a tools, such as Xilinx’s Vivado HLS, to com- full memory hierarchy model. Such infrastruc- pile the high-level implementation (for ture lets users explore customized and shared example, C/Cþþ) to RTL. memory hierarchies for accelerators in a heter- Writing RTL manually takes significant ogeneous environment. In a case study with effort, and the quality highly depends on the GEMM benchmark, Aladdin uncovers designers’ expertise. Although HLS tools significant high-level design tradeoffs by evalu- offer opportunities to automatically generate ating a broader design space of the entire sys- the RTL implementation, extensively tuning tem. This analysis results in more than 3Â C code is still necessary to meet design performance improvements compared to the requirements. After generating RTL, design- conventional approach of designing accelera- ers must use commercial CAD tools, such as tors in isolation. Synopsys’s Design Compiler and Mentor Graphics’ ModelSim, to estimate power and Background cycle counts. Hardware acceleration exists in many In contrast, Aladdin takes unmodified, forms, ranging from analog accelerators, high-level language descriptions of algo- fixed-function accelerators, and program- rithms to generate a DDDG representation mable accelerators, such as GPUs and digital of accelerators, which accurately models the signal processors. In this work, we focus on cycle-level power, performance, and area of fixed-function accelerators. We discuss the realistic accelerator designs. As a pre-RTL design flow, design space, and state-of-the-art simulator, Aladdin is orders of magnitude research infrastructure for fixed-function faster than existing CAD flows. accelerators in order to illustrate the chal- lenges associated with current accelerator Accelerator design space research and discuss why a tool like Aladdin Despite the application-specific nature of opens up new research opportunities for accelerators, the accelerator design space is architects. quite large, given a range of architecture- and ............................................................ 60 IEEE MICRO circuit-level alternatives. Figure 4 illustrates a power-performance design space of accelera- 140 Datapath + memory tor designs for the GEMM workload from Datapath only the SHOC benchmark suite. The square points were generated from a commercial 120 HLS flow sweeping datapath parameters, including loop-iteration parallelism, pipelin- 100 ing, array partitioning, and clock frequency. However, HLS flows generally provision a 80 fixed latency for all memory accesses, implic- itly assuming local scratchpad memory fed 60 by direct memory access (DMA) controllers. Such simple designs are not well suited for Accelerator power (mW) 40 capturing data locality or interactions with complex memory hierarchies. The circle points in Figure 4 were generated by Aladdin 20 integrated with a full cache hierarchy and memory model, sweeping not only datapath 0 0 200 400 600 800 1,000 1,200 parameters but also memory parameters. By Execution time (μs) doing so, Aladdin exposes a rich design space that incorporates the realistic memory penal- Figure 4. GEMM design space. A large
Recommended publications
  • MOVR Mobile Overview Report April – June 2017
    MOVR Mobile Overview Report April – June 2017 The first step in a great mobile experience TBD 2 The first step in a great mobile experience TBD 3 The first step in a great mobile experience Q1 2017 to Q2 2017 Comparisons Top Smartphones Top Smartphones Africa Asia Europe N. America Oceania S. America • New to the list this Apple iPhone 5S 1.3% 2.9% 4.1% 3.5% 3.9% 3.1% quarter are the Apple Apple iPhone 6 2.2% 4.8% 5.6% 9.3% 10.1% 4.5% iPhone SE and the Apple iPhone 6 Plus 0.8% 2.4% 0.9% 3.7% 3.2% 1.0% Samsung J7 Prime. Apple iPhone 6S 1.7% 4.4% 6.3% 11.0% 13.9% 3.1% Apple iPhone 6S Plus 0.7% 2.6% 1.1% 6.1% 4.6% 0.9% • Dropping off the list Apple iPhone 7 1.2% 2.9% 4.0% 7.6% 9.3% 2.2% are the Motorola Moto Apple iPhone 7 Plus 0.7% 3.1% 1.3% 6.9% 6.2% 1.1% G4, Samsung Galaxy J2 Apple iPhone SE 0.3% 0.6% 2.4% 2.2% 2.1% 1.0% (2015), and the Huawei P8 Lite 2.2% 0.3% 2.1% 0.2% 0.2% 0.6% Vodafone Smart Kicka. Motorola Moto G 0.0% 0.0% 0.1% 0.2% 0.0% 2.1% Motorola Moto G (2nd Gen) 0.0% 0.1% 0.0% 0.1% 0.1% 2.6% • North America and Motorola MotoG3 0.0% 0.1% 0.1% 0.2% 0.1% 3.1% Oceania continue to be Samsung Galaxy A3 1.2% 0.9% 2.2% 0.1% 0.2% 0.5% concentrated markets Samsung Galaxy Grand Neo 1.8% 0.8% 0.8% 0.1% 0.1% 0.6% for brands, with the Samsung Galaxy Grand Prime 0.5% 1.0% 1.5% 0.9% 0.1% 3.5% top smartphones Samsung Galaxy J1 1.8% 0.6% 0.3% 0.1% 0.3% 0.8% accounting for 63.7% and 74.4% Samsung Galaxy J1 Ace 2.5% 0.2% 0.0% 0.1% 0.3% 0.7% respectively.
    [Show full text]
  • Open APPLE THESIS FINAL__1 .Pdf
    THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF SUPPLY CHAIN AND INFORMATION SYSTEMS SUPPLY CHAIN AS A SWORD AND A SHIELD: LESSONS FROM APPLE LAUREN E. STERN SPRING 2013 A thesis submitted in partial fulfillment of the requirements for a baccalaureate degree in Supply Chain and Information Systems with honors in Supply Chain and Information Systems Reviewed and approved* by the following: Felisa Preciado Clinical Associate Professor of Supply Chain and Information Systems Thesis Supervisor John C. Spychalski Professor Emeritus of Supply Chain Management Honors Adviser * Signatures are on file in the Schreyer Honors College. i ABSTRACT In the past few decades, Apple has gone from being an incredible startup success story, to a company on the very brink of failure, to its current status as one of the most valuable and emulated companies in the world. It originally got its start through technological innovations, laser-like focus and a sometimes uncanny understanding for what consumers would want, and those things have certainly been constant themes during its periods of success. But one of the biggest reasons for its outstanding success in the past decade has been the way Apple has leveraged its supply chain both to control costs and to give it a competitive advantage unmatched by any of its competitors. This paper analyzes the Apple supply chain to try to identify the way in which Apple has taken advantage of its supply chain, adapted it to changes in the market, and used it as both a defensive and offensive competitive weapon to become one of the most successful and influential companies in the world.
    [Show full text]
  • NC Sizemore,President
    Key articles..... A Clean Mac— Simple ways to banish grunge, dirt and dust bunnies from Next Monthly Meeting - Feb. 14, 2012, 7 PM your computer and peripherals— Using a Mac to Trace Your Family History, page 3. Bobby Adams, OMUG Member January 2012 Life After iWeb— What do you do now. What alternative website software is available— page 5. Everything you ever wanted to know about using the App Store presented in step-by-step style— page 6. February 2012 Hi All..... org/workshops/workshop_12.html and here: to learning about some new research tools (hope- The Christmas decorations are http://ocalamug.org/wp3/?page_id=181. fully free ones) myself. put away and dozens (it seems) One of the topics was “Using Text Edit as your As for me, I’m currently working my way of spring projects are upon me. primary word processor”. That is exactly what I am through “Steve Jobs” by Walter Isaacson. It is 571 I assume on you also. If you were in doing now as I write this message, and it is work- pages plus notes and references. I’m less than half the January meeting you no doubt ing great. TextEdit is doing everything I want it to way through and have found it to be a fascinating added to your spring “to do” list and it is easy to use. I save and transmit my files in story — almost stranger than fiction. I recommend with all the house cleaning and .rtf (rich text format) and have never had anyone it. You will find out a lot about Steve and about organizing tips Phil gave us.
    [Show full text]
  • The Carroll News
    John Carroll University Carroll Collected The aC rroll News Student 11-1-2012 The aC rroll News- Vol. 89, No. 8 John Carroll University Follow this and additional works at: http://collected.jcu.edu/carrollnews Recommended Citation John Carroll University, "The aC rroll News- Vol. 89, No. 8" (2012). The Carroll News. 998. http://collected.jcu.edu/carrollnews/998 This Newspaper is brought to you for free and open access by the Student at Carroll Collected. It has been accepted for inclusion in The aC rroll News by an authorized administrator of Carroll Collected. For more information, please contact [email protected]. 2012 election: The CN voter’s guide p. 10 – 11 THE Thursday,C NovemberARROLL 1, 2012 The Student Voice of John Carroll University N Since 1925 EWSVol. 89, No. 8 JCU feels effects of Sandy Grasselli grows up Ryllie Danylko whole inside wall, there are water spots, and Updates planned for the library Campus Editor [water is] dripping from the ceiling,” she said. Abigail Rings She and her roommate also found puddles of Staff Reporter Over the past few days, Superstorm Sandy water on top of their armoires. Grasselli Library and Breen Learning Center may be seeing has been wreaking havoc along the East Coast, Other Campion residents, sophomores Marie some updates to policies to make the library more accessible causing damage to vital infrastructures, school Bshara and Rachel Distler, had water leaking and useful to students. The updates will include everything from cancellations, widespread power outages and through their window during the storm. “Rachel whiteboards in the study rooms to a 24-hour room for student use.
    [Show full text]
  • Session 402 Evan Cheng Sr
    What's New in the LLVM Compiler Session 402 Evan Cheng Sr. Manager, Compilation Technologies These are confidential sessions—please refrain from streaming, blogging, or taking pictures Focused on Providing Best-in-Class Tools Focused on Providing Best-in-Class Tools Support for latest hardware Focused on Providing Best-in-Class Tools Support for latest hardware Improving performance Focused on Providing Best-in-Class Tools Support for latest hardware Improving performance Improving developer productivity Support for Latest Hardware armv7s Architecture • Architecture for Apple A6 processor ■ iPhone 5 and new iPads • Extensive tuning and optimization in the compiler ■ Uses instructions only available in armv7s armv7s Architecture • Architecture for Apple A6 processor ■ iPhone 5 and new iPads • Extensive tuning and optimization in the compiler ■ Uses instructions only available in armv7s Important for achieving max performance! armv7s Architecture • Already part of the standard architectures for iOS apps Intel AVX • 256-bit floating-point vector computation ■ Twice as wide as SSE vectors ■ Supported in Sandy Bridge and Ivy Bridge processors • Good for loops with operations that can be performed in parallel ■ Floating-point intensive ■ High ratio of computation to memory bandwidth Intel AVX2 • Supported in “Haswell” processors ■ Extend the AVX instruction set to integers ■ Adds fused multiply-accumulate for increased floating point throughput ■ More extensive set of vector shuffle instructions Using AVX2 with Fallback to AVX / SSE • Check
    [Show full text]
  • Tmobile Device Matrix
    Device Portfolio Apple iPhone 5C Apple iPhone 5S Apple iPhone 6 Apple iPhone 6 Device Name 8 GB 16 GB 16GB Plus 16GB Image Up-Front Purchase Price: $449.76 $549.84 $649.92 $749.91 Monthly EIP Price: $18.74 $22.91 $27.08 $31.25 Device Size 2.33" x 4.90" x 0.35" 2.31" x 4.87" x 0.30" 2.64" x 5.44" x 0.27" 3.06" x 6.22" x 0.28" Display Size 4.0" 4.0" 4.7" 5.5" Weight 4.65 ounces 3.95 ounces 4.55 ounces 6.07 ounces Talk Time Up to 10 hours Up to 10 hours Up to 14 hours Up to 24 hours Standby Time Up to 10 days Up to 10 days Up to 10 days Up to 16 days Built-in, rechargeable, Built-in, rechargeable, Built-in, rechargeable, Built-in, rechargeable, Included Battery lithium-ion lithium-ion lithium-ion lithium-ion Charger Type Lightning Lightning Lightning Lightning Network Technology 2G, 3G, 4G, LTE 2G, 3G, 4G, LTE 2G, 3G, 4G, LTE 2G, 3G, 4G, LTE 1, 2, 3, 4, 5, 7, 8, 13, 1, 2, 3, 4, 5, 7, 8, 13, 1, 2, 3, 4, 5, 8, 13, 17, 1, 2, 3, 4, 5, 8, 13, 17, Operating Band 17, 18, 19, 20, 25, 26, 17, 18, 19, 20, 25, 26, 19, 20, 25 19, 20, 25 28, 29 28, 29 Part Number N/A N/A N/A N/A Operating System iOS 7 iOS 7 iOS 8 iOS 8 Apple A7 Dual Apple A6 Dual A8 processor with M8 A8 processor with M8 Processor Processor with M7 Processor co-processor co-processor motion co-processor Memory 8 GB Storage 16 GB Storage 16 GB Storage 16 GB Storage Micro SD Card Not supported Not supported Not supported Not supported Keyboard Type Touch Touch Touch Touch Wi-Fi Yes Yes Yes Yes Wi-Fi Calling Yes with iOS 8 update Yes with iOS 8 update Yes Yes Bluetooth Yes Yes Yes Yes Tethering Yes Yes Yes Yes Camera F: 1.2; R: 8.0 F: 1.2; R: 8.0 F: 1.2; R: 8.0 F: 1.2; R: 8.0 Media Player Yes Yes Yes Yes Text, IM & Email Yes Yes Yes Yes SIM Type Nano GBA Nano GBA Nano GBA Nano GBA CMAS, HD Voice, CMAS, HD Voice, CMAS, HD Voice, CMAS, HD Voice, Notes HAC M3/T4 HAC M3/T4 HAC M3/T4, VoLTE HAC M3/T4, VoLTE http://support.t- http://support.t- http://support.t- http://support.t- Full Specs List mobile.com/docs/DOC- mobile.com/docs/DOC- mobile.com/docs/DOC- mobile.com/docs/DOC- 9041 9042 16498 16500 SP - iOS Page 1.
    [Show full text]
  • Apple Inc.: Managing a Global Supply Chain1
    For the exclusive use of T. Ausby, 2015. W14161 APPLE INC.: MANAGING A GLOBAL SUPPLY CHAIN1 Ken Mark wrote this case under the supervision of Professor P. Fraser Johnson solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be transmitted, photocopied, digitized or otherwise reproduced in any form or by any means without the permission of the copyright holder. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Business School, Western University, London, Ontario, Canada, N6G 0N1; (t) 519.661.3208; (e) [email protected]; www.iveycases.com. Copyright © 2014, Richard Ivey School of Business Foundation Version: 2014-06-12 INTRODUCTION Jessica Grant was an analyst with BXE Capital (BXE), a money management firm based in Toronto.2 It was February 28, 2014, and Grant was discussing her U.S. equity mandate with BXE’s vice president, Phillip Duchene. Both Grant and Duchene were trying to identify what changes, if any, they should make to BXE’s portfolio. “Apple is investing in its next generation of products, potentially the first new major product lines since Tim Cook took over from Steve Jobs,” she said. Apple Inc., the world’s largest company by market capitalization, had introduced a series of consumer products during the past dozen years that had transformed it into the industry leader in consumer devices.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy
    Apple Inc. Apple iOS CoreCrypto Kernel Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.02 Version 01.02 June, 2015 Prepared for: Apple Inc. 1 Infinite Loop Cupertino, CA 95014 www.apple.com Prepared by: atsec information security Corp. 9130 Jollyville Road, Suite 260 Austin, TX 78759 www.atsec.com ©2015 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision Table of Contents 1 INTRODUCTION ................................................................................................................ 4 1.1 PURPOSE ...........................................................................................................................4 1.2 DOCUMENT ORGANIZATION / COPYRIGHT .................................................................................4 1.3 EXTERNAL RESOURCES / REFERENCES .....................................................................................4 1.3.1 Additional References ................................................................................................4 1.4 ACRONYMS .........................................................................................................................5 2 CRYPTOGRAPHIC MODULE SPECIFICATION ........................................................................ 7 2.1 MODULE DESCRIPTION .........................................................................................................7 2.1.1 Module Validation Level.............................................................................................7
    [Show full text]
  • Apple A6 Teardown Guide ID: 10528 - Draft: 2017-11-16
    Apple A6 Teardown Guide ID: 10528 - Draft: 2017-11-16 Apple A6 Teardown We snuck a peek inside Apple's new A6 processor on September 24, 2012. Written By: Andrew Optimus Goldheart This document was generated on 2020-11-19 01:46:15 PM (MST). © iFixit — CC BY-NC-SA www.iFixit.com Page 1 of 17 Apple A6 Teardown Guide ID: 10528 - Draft: 2017-11-16 INTRODUCTION Geeks rejoice! We have partnered with Chipworks for a double-the-geeks, double-the-fun teardown of Apple's new A6 Processor. The A6 is rumored to make use of two custom 1 GHz CPUs running the ARMv7s instruction set. Along our journey into the A6, we'll also give you a sneak peak at some of the fun toys instruments at Chipworks. Whether you enjoy getting all science-y with us, or just like to see the insides of the latest products, be sure to follow us @iFixit on Twitter and check out our page on The Book to be updated on the newest iFixit goings-on! This document was generated on 2020-11-19 01:46:15 PM (MST). © iFixit — CC BY-NC-SA www.iFixit.com Page 2 of 17 Apple A6 Teardown Guide ID: 10528 - Draft: 2017-11-16 Step 1 — Apple A6 Teardown Welcome to the third installment of Science with iFixit. This time around, we've got a helping hand from our buddies at Chipworks. Disclaimer: there will be a lot of technical jargon being thrown around in this teardown. We'll try to succinctly explain what we can, but expect to see plenty of links to good ol' Wikipedia.
    [Show full text]
  • Halaman Judul Halaman Pengesahan Pembimbing
    PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI HALAMAN JUDUL PENGARUH KUALITAS PRODUK, HARGA, DAN PROMOSI TERHADAP KEPUTUSAN PEMBELIAN SMARTPHONE IPHONE (studi kasus konsumen Iphone di kampus 1 Universitas Sanata Dharma) Skripsi Diajukan dalam Rangka Menulis Skripsi Program Studi Manajemen, Jurusan Manajemen Fakultas Ekonomi Universitas Sanata Dharma Oleh : Leonardus Niko Andira NIM: 152214089 PROGRAM STUDI MANAJEMEN JURUSAN MANAJEMEN FAKULTAS EKONOMI UNIVERSITAS SANATA DHARMA YOGYAKARTA 2019 HALAMAN PENGESAHAN PEMBIMBING PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI HALAMAN JUDUL PENGARUH KUALITAS PRODUK, HARGA, DAN PROMOSI TERHADAP KEPUTUSAN PEMBELIAN SMARTPHONE IPHONE (studi kasus konsumen Iphone di kampus 1 Universitas Sanata Dharma) Skripsi Diajukan dalam Rangka Menulis Skripsi Program Studi Manajemen, Jurusan Manajemen Fakultas Ekonomi Universitas Sanata Dharma Oleh : Leonardus Niko Andira NIM: 152214089 PROGRAM STUDI MANAJEMEN JURUSAN MANAJEMEN FAKULTAS EKONOMI UNIVERSITAS SANATA DHARMA YOGYAKARTA 2019 HALAMAN PENGESAHAN PEMBIMBING i PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI Moto dan Persembahan “Kamu harus bisa menghibur dirimu, karena kebahagian tidak datang dari manapun melainkan dari dalam dirimu sendiri” (CakNun) “Apa yang membuatmu bahagia lakukanlah dan apa yang membuatmu bersedih tinggalkan” Skripsi ini saya persembahkan untuk : Tuhan Yesus Kristus dan Bunda Maria yang selalu memberkati saya dalam mengerjakan skripsi dari awal hingga selesai. Ayah dan
    [Show full text]
  • A Comparative Study of 64 Bit Microprocessors Apple, Intel and AMD
    Special Issue - 2016 International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 ICACT - 2016 Conference Proceedings A Comparative Study of 64 Bit Microprocessors Apple, Intel and AMD Surakshitha S Shifa A Ameen Rekha P M Information Science and Engineering Information Science and Engineering Information Science and Engineering JSSATE JSSATE JSSATE Bangalore, India Bangalore, India Bangalore, India Abstract- In this paper, we draw a comparative study of registers, even larger .The term may also refer to the size of microprocessor, using the three major processors; Apple, low-level data types, such as 64-bit floating-point numbers. Intel and AMD. Although the philosophy of their micro Most CPUs are designed so that the contents of a architecture is the same, they differ in their approaches to single integer register can store the address of any data in implementation. We discuss architecture issues, limitations, the computer's virtual considered an appropriate size to architectures and their features .We live in a world of constant competition dating to the historical words of the work with for another important reason: 4.29 billion Charles Darwin-‘Survival of the fittest ‘. As time passed by, integers are enough to assign unique references to most applications needed more processing power and this lead to entities in applications like databases. an explosive era of research on the architecture of Some supercomputer architectures of the 1970s and microprocessors. We present a technical & comparative study 1980s used registers up to 64 bits wide. In the mid-1980s, of these smart microprocessors. We study and compare two Intel i860 development began culminating in a 1989 microprocessor families that have been at the core of the release.
    [Show full text]
  • December 2013
    December 2013 Welcome to Volume 4, Issue 12 of iDevices (iPhone, iPod & iPad) SIG Meetings Need Help? Go to the iDevice FORUM, click HERE To find Apps that cost money but are FREE only today, click HERE Wierd Holiday Gifts ======ooooo======= NEWS NEWS NEWS NEWS NEWS =======ooooo======= Apple releases 12 Days of Gifts app for iPhone and iPad, will give you free apps, iBooks, movie rentals, TV episodes from December 26 to January 6 By Rene Ritchie, Monday, Dec 9, 2013 Apple has just released this year's 12 Days of Gifts app for iPhone and iPad. Download this free app, and every day at midnight local time, between December 26 and January 6, you'll get offered a free gift from iTunes. Gifts can include apps, iBooks, music, movies and movie rentals, and TV show episodes. The exact content and availability will likely vary by region, but hey - presents and presents, right? Full FAQ below, and grab the app now via the link below! Free - 12 Days of Gifts 12 Days of Gifts FAQ I’m travelling outside of the country or region in which I have my iTunes store account. Does that affect the countdown and when new gifts arrive? Because the countdown and new gifts are based on the timezone associated with your account, new gifts will be available at midnight in that timezone. How do I download my gift? To download a gift, tap View Gift and then tap Free. To download gifts, you must be signed in with your Apple ID. To download books, you must have the free iBooks app installed.
    [Show full text]