by Martha Kim and Moin Qureshi on May 23, 2022 | Tags: Conferences, Review, Reviewing, tcca
Scientific progress relies on sound reviewing processes. The integrity of our review process is paramount, and it rests on our handling of ethical concerns and conflicts of interest. These issues have been compounded by the rapid growth in the computer architecture...
Read more...
by Neeraja Yadwadkar on May 12, 2022 | Tags: Cloud computing, Datacenters, Machine Learning
It was more than 10 years ago that I first started studying machine learning (ML). Serendipitously, I ended up leveraging ML techniques developed for biological sequence analysis for optimizing storage systems. In the recent past, I have focused on optimizing and...
Read more...
by Emery Berger on May 10, 2022 | Tags: Accelerators, Blockchain, Cryptocurrencies
INTEL LAUNCHES NEW BITCOIN MINING CHIP, BLOCKSCALE Intel’s new bitcoin mining chip, the Intel Blockscale ASIC, will ship in Q3 2022 to select customers. (Bitcoin Magazine, April 2022) STOP! Before you read even one more sentence of this article: if you are currently...
Read more...
by Richard L. Sites on May 6, 2022 | Tags: Operating Systems, Page Management, Virtual Memory
Virtual memory was invented in a time of scarcity. Is it still a good idea? — Chuck Thacker 2010 Turing Lecture It is time for the computer industry to consider larger minimum page sizes. The ~4KB page size has been around since 1962. With cell phones and even...
Read more...
by Brandon Lucia on May 3, 2022 | Tags: Edge Devices, Energy Harvesting, Satellites, Space systems
Today it is possible, with a little bit of planning and some careful preparation, to send your computer architecture research into space. We are in the early days of a new space race that is making it possible to launch things to space more easily, more cheaply, and...
Read more...
by Jung Ho Ahn on Apr 28, 2022 | Tags: Bootstrapping, Emerging Application, Homomorphic Encryption, Privacy-preserving Computing
Homomorphic encryption (HE) is an emerging, computationally intensive application for computer architects. HE allows computations on encrypted data (called ciphertexts). In the machine-learning-as-a-service era, HE is highlighted as an enabler for privacy-preserving...
Read more...