Computer Architecture Today

Informing the broad computing community about current activities, advances and future directions in computer architecture.
HPCA-25 Summary

HPCA-25 Summary

HPCA celebrated its 25th anniversary this year with significant participation of over 300 attendees! It was held in Washington D.C., USA between February 16-20. Accelerators was a bigger theme this year (not only for ML but covering a broader range of domains...

Read more...

Tips for a New Computer Architecture PhD Student

Tips for a New Computer Architecture PhD Student

I have been fortunate enough to have many helpful senior students and two wonderful advisors to learn from throughout my PhD. Now as a senior PhD student myself, I have identified some lessons that proved most valuable as well as common mistakes made by younger...

Read more...

The Role of Luck in Academic Careers

The Role of Luck in Academic Careers

Modern academic culture is founded on perpetual evaluation and relentless ranking of researchers and their results.  Obtaining competitive research funds and publishing in top-tier venues are prerequisites to a successful career. Unfortunately, as was shown by several...

Read more...

Artifact Evaluation for Reproducible Quantitative Research

Artifact Evaluation for Reproducible Quantitative Research

We all love good ol’ architecture research! From a germ of an idea, through a thorny path of its implementation and validation, to its publication. With its publication, hopefully comes its adoption. With its adoption, grows our reputation. With our reputation, come to us many good things including fantastic colleagues and lucrative grants! Therefore, it ought to bother us a great deal when good ideas get no adoption. And that’s why we care deeply about understanding and eliminating barriers to successful adoption. In this blog post, we discuss “Artifact Evaluation” to foster wider adoption of computer architecture ideas.

Read more...

Please Disclose Security Vulnerabilities!

Please Disclose Security Vulnerabilities!

In a recent opinion post on security disclosures, Uht questions if the public disclosure of hardware security vulnerabilities has had any benefits, and suggests that it would be better not to disclose these vulnerabilities. As Uht points out, debate on security...

Read more...

Let’s Keep it to Ourselves: Don’t Disclose Vulnerabilities

Let’s Keep it to Ourselves: Don’t Disclose Vulnerabilities

There are millions of viruses, etc., in the wild today. Countless new ones are devised by black-hat hackers all the time. In order to proactively defend against new exploits, some white-hatters seek out or create weaknesses or vulnerabilities and then devise fixes for them. However, in some cases, such as Spectre, fixes are not readily apparent, either to the inventor or the vendor of the target software or hardware. Regardless of the existence of a fix or not, the question arises as to what to publicize or disclose about the vulnerability. We argue that no public disclosure should be made at all, until and unless the exploit appears in the wild.

Read more...