Mobile SoCs: The Wild West of Domain Specific Architectures
The Moore’s Law engine that we have come to depend upon is sputtering. It is encouraging architects to innovate in alternative ways to keep the industry moving forward. The most widely accepted approach is using domain specific architectures, and as such, in recent...
Data management on non-volatile memory
In a recent blog post, Steve Swanson presented three milestones that mark the adoption path of non-volatile memory by applications. The next step in this path is tailoring fundamental protocols and algorithms for non-volatile memory. We illustrate this point using...
Chilly Climate in Computer Architecture?
To better understand the climate of the computer architecture community and assess initiatives launched by WICARCH, we conducted a survey from mid-June to mid-July. The survey followed several efforts to understand gender diversity in computer architecture and the...
Sacrificing Interoperability for Information Security: Containing Data Loss and Malware Propagation
Using hardware that does not provide software and data interoperability could address security problems.
How to be a good PC member ……. not!
Here are some tips to be a good PC member.
