by Simha Sethumadhavan on May 31, 2017 | Tags: Architecture, Hardware, Policy, Security
What should governments do when they discover a hardware 0-day? In the US, as a matter of policy, any vulnerability that is deemed to affect critical infrastructure is disclosed to the vendors by the government [VEP]. The government can hide vulnerabilities (and...
Read more...
by Simha Sethumadhavan on May 25, 2017 | Tags: Architecture, Hardware, Policy, Security
[Editor’s Note: This post is the first in a series of micro-blogs over four consecutive days.] 0-day security exploits are attacks that use vulnerabilities that are unknown to a vendor. They are referred to as 0-days because the vendor knows about them for zero...
Read more...
by Abhishek Bhattacharjee on May 22, 2017 | Tags: Systems, Virtual Memory
As computer architects, one of our key tasks is to propose abstractions that improve system programmability in a manner that stands the test of time. One such abstraction, that has been crucial to the success of computing, is the concept of virtual memory. In this...
Read more...
by Mark Silberstein on May 18, 2017 | Tags: Accelerators, Databases, Networking, Programmability, Specialization
In this blogpost I share what I learned at the Seventh Workshop on Multi-core and Rack-scale Systems (MaRS) co-located with the EuroSYSÂ Conference on Computer Systems held in Belgrade in April. It is a small but vigorous interdisciplinary workshop that focuses on the...
Read more...
by Reetuparna Das on May 8, 2017 | Tags: Accelerators, Cache, Memory, Near Data Computing, Specialization
Computer designers have traditionally separated the role of storage and computation. Memories stored data. Processors computed them. Is this distinction necessary? A human brain doesnât separate the two so distinctly, so why should a computer? Before I address this...
Read more...
by Suchakrapani Sharma on May 1, 2017 | Tags: Debugging, Performance
To a developer, debugging, profiling and tracing tools are akin to the tools that a craftsman carries in a belt on construction sites. In fact, constructing robust code is as important as observing how it behaves during actual execution on production hardware....
Read more...
by Jignesh Patel on Apr 26, 2017 | Tags: Databases, Shared-Nothing, Specialization
Iâm not sure if I should be writing a blog for architects. As some of you know, my expertise is in database systems. In response to this blog, Iâm likely to get flames from some of you informing me about how I have missed the boat in my observations. If that happens,...
Read more...
by T. N. Vijaykumar on Apr 17, 2017 | Tags: Conference
There are many significant issues with our review process which has both false-accepts (when papers that should be rejected are accepted) and false-rejects (when papers that should be accepted are rejected). I am not talking about borderline cases that require nuanced...
Read more...
by Paul V. Gratz on Apr 13, 2017 | Tags: Conference
This year’s 22nd ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’17) has just concluded. ASPLOS’17 represents a milestone across several axes for the community. This year’s...
Read more...
by Keshav Pingali on Apr 6, 2017 | Tags: Machine Learning, Systems, Vision
In 1960, the physicist Eugene Wigner wrote a famous essay titled âThe Unreasonable Effectiveness of Mathematics in the Natural Sciencesâ in which he explored the question of why mathematics is so remarkably useful in the natural sciences. A contemporary example of...
Read more...