


Intelligent memory architecture with new memory technologies
A previous blog titled “Blurring the lines between memory and compute” by R. Das was a nice summary of the history and the recent trends on addressing the memory wall challenges with process-in-memory (PIM) ideas. This blog would like to further highlight...
A Proposal to Coordinate Reviewing Across Computer Architecture Conferences
Peer-reviewed articles in top conferences are both the result and the driving force of computer architecture research. As our community expands and the number of submissions to top conferences continues to grow, it will be imperative to improve the review process....
Speculating about speculation: on the (lack of) security guarantees of Spectre-V1 mitigations
Spectre and Meltdown opened the Pandora box of a new class of speculative execution attacks that defeat standard memory protection mechanisms. These attacks are not theoretical, they pose a real and immediate security threat, and have been reportedly exploited by...
Trials and Tribulations of Telecommuting
Telecommuting is becoming increasingly common. This is partly due to technological advances that make it more feasible, and economic and family dynamics that tie people down to a particular location. With the exception of big cities with tech hubs, accommodating dual...
Verifying Quantum Software and Hardware
Since my last post, quantum computing hardware continues to develop at an impressive pace, as seen with the recent announcement of Google’s 72-qubit machine (although no test data has been released yet). Pushing the limits of engineering and technology, these...
ISCA 2018 Summary: A New Golden Age for Computer Architecture
The LA downtown became a little more vibrant in the first week of June, as computer architects from all over the world descended in numbers in the brand new Intercontinental Hotel and its funky elevator design, for ISCA’18. The enthusiasm was palpable, as apart from...
A Computer Architecture Solution to Fake News and Autonomous Car Accidents
Can principles for engineering robust computer systems used to build robust societies?

R2: The Future of ISCA, or not
The ad hoc R2 committee jointly formed by SIGARCH/TCCA has been unsuccessful in its attempts to effect change in the ISCA review process.
