


Hybrid Quantum-Classical Computing
Quantum and classical computing will work together to solve currently intractable problems.

Approaches to System Security: Using Cryptographic Techniques to Minimize Trust
This is the first post in a series of posts on different approaches to systems security especially as they apply to hardware and architectural security. In this post, we will consider the use of mathematics/cryptography as an approach to improving systems security....
Reflections on trusting SGX
The security community will remember the year of 2018 as the year of speculative execution attacks. Meltdown and Spectre, the recent Foreshadow (L1TF in Intel’s terminology), and their variants demonstrate how the immense processor design complexity, perpetual...
DNN Accelerator Architecture – SIMD or Systolic?
While the concept of hardware acceleration has been around for a while, DNN accelerators are perhaps the first to see the light of commercial adoption due to the AI/ML wave. Giant software corporations, veteran hardware companies, and a plethora of start-ups have...
Mobile SoCs: The Wild West of Domain Specific Architectures
The Moore’s Law engine that we have come to depend upon is sputtering. It is encouraging architects to innovate in alternative ways to keep the industry moving forward. The most widely accepted approach is using domain specific architectures, and as such, in recent...
Data management on non-volatile memory
In a recent blog post, Steve Swanson presented three milestones that mark the adoption path of non-volatile memory by applications. The next step in this path is tailoring fundamental protocols and algorithms for non-volatile memory. We illustrate this point using...
Chilly Climate in Computer Architecture?
To better understand the climate of the computer architecture community and assess initiatives launched by WICARCH, we conducted a survey from mid-June to mid-July. The survey followed several efforts to understand gender diversity in computer architecture and the...
Sacrificing Interoperability for Information Security: Containing Data Loss and Malware Propagation
Using hardware that does not provide software and data interoperability could address security problems.

How to be a good PC member ……. not!
Here are some tips to be a good PC member.