


Worth the Read
Increasing diversity in the broad field of computing is an ongoing challenge. Although many people are aware of the “google memo”, I don’t think many SIGARCH (and adjacent SIG) members are aware of a rebuttal by John Hennessy, Maria Klawe, and David...
Overwhelming Statistical Evidence That Our Review Process Is Broken
I have been saying that over-positive PC (OPPC) members’ high scores mess up the paper rankings, the coverage of online discussions (lower-score papers are ignored), and the discussion order at the PC meeting. Previously I had analyzed only the pre-rebuttal score distributions but not the impact on the actual outcomes. Now, I have statistical evidence of the impact.

Towards Predictable Performance for Interactive Workloads
… today it is hard for software developers to drill down to determine the root causes of performance fluctuations.

A Follow-up to “The Unreasonable Ineffectiveness of Machine Learning in Computer Systems Research”
I am grateful to everyone who responded to my post in April that asked why machine learning has had limited impact on computer systems research. In addition to commenting on this website and sending me email, people discussed this question at length on reddit and...
A Decade of Mobile Computing
The smartphone is the most pervasive mobile computing device on the planet. There are over 2.1 billion devices worldwide, and this number is rising sharply as smartphone penetration increases in emerging markets like China and India. By 2020, there will be 6 billion...
A Vision of Persistence
For decades, memory systems have relied on DRAM for capacity, SRAMs for speed and then turned programmers loose with malloc(), free(), and pthreads to build an amazing array of useful, carefully tuned, composable, and remarkably useful data structures. However, these...
Thoughts on ISCA44
The 44th ISCA just wrapped up. This year it was held in Toronto, which proved to be a great location owning in no small part to great local organizing and participation. I find attending ISCA to be the best way to quickly read the pulse of the broader Computer...
Freedom vs. Security in Computer Systems
Is it time to consider designing and operating computer systems with an “off-by-default” attitude to proactively defend against such attacks?
