Computer Architecture Today

Informing the broad computing community about current activities, advances and future directions in computer architecture.
The Role of Luck in Academic Careers

The Role of Luck in Academic Careers

Modern academic culture is founded on perpetual evaluation and relentless ranking of researchers and their results.  Obtaining competitive research funds and publishing in top-tier venues are prerequisites to a successful career. Unfortunately, as was shown by several...

Read more...

Artifact Evaluation for Reproducible Quantitative Research

Artifact Evaluation for Reproducible Quantitative Research

We all love good ol’ architecture research! From a germ of an idea, through a thorny path of its implementation and validation, to its publication. With its publication, hopefully comes its adoption. With its adoption, grows our reputation. With our reputation, come to us many good things including fantastic colleagues and lucrative grants! Therefore, it ought to bother us a great deal when good ideas get no adoption. And that’s why we care deeply about understanding and eliminating barriers to successful adoption. In this blog post, we discuss “Artifact Evaluation” to foster wider adoption of computer architecture ideas.

Read more...

Please Disclose Security Vulnerabilities!

Please Disclose Security Vulnerabilities!

In a recent opinion post on security disclosures, Uht questions if the public disclosure of hardware security vulnerabilities has had any benefits, and suggests that it would be better not to disclose these vulnerabilities. As Uht points out, debate on security...

Read more...

Let’s Keep it to Ourselves: Don’t Disclose Vulnerabilities

Let’s Keep it to Ourselves: Don’t Disclose Vulnerabilities

There are millions of viruses, etc., in the wild today. Countless new ones are devised by black-hat hackers all the time. In order to proactively defend against new exploits, some white-hatters seek out or create weaknesses or vulnerabilities and then devise fixes for them. However, in some cases, such as Spectre, fixes are not readily apparent, either to the inventor or the vendor of the target software or hardware. Regardless of the existence of a fix or not, the question arises as to what to publicize or disclose about the vulnerability. We argue that no public disclosure should be made at all, until and unless the exploit appears in the wild.

Read more...

The Case for Quantum Computing

The Case for Quantum Computing

In a recent IEEE Spectrum article, Mikhail Dyakonov makes The Case Against Quantum Computing, focusing on the idea that building a quantum computer would require precise control over 2300 continuous variables. This view is absolutely correct if we were building an...

Read more...

The Year in Review

The Year in Review

Read more...