You can still hear echoes of the trumpeter's 1956 visit in Accra's clubs today. | Continue reading
The discontinued headset will gain a second life.. | Continue reading
S&T's is working on cost-effective technologies to detect chemical and biological threats inside a subway environment. | Continue reading
The CSS image-set() function has been supported in Chromium-based browsers since 2012 and in Safari since version 6. Support recently landed in Firefox | Continue reading
In this animated lecture selection, Jordan Peterson discusses the important lessons about picking your sacrifice, pursuing a noble aim, and facing suffering ... | Continue reading
Simply erasing things from the internet comes at a cost. It might not be worth it. | Continue reading
[slides](https://media.libreplanet.org/u/libreplanet/m/free-libre-solutions-to-address-the-shortage-of-ventilators-slides/)Robert L. Read, PhD, has been a free software fan since 1988, and has taken that passion with him into director-level positions in the software industry and … | Continue reading
The ACM and IEEE Joint Investigative Committee (JIC) has completed its investigation into the allegations of professional and publications-related misconduct in connection with ISCA 2019. The full … | Continue reading
I once attended a talk by Yoky Matsuoka when I was young – so young, in fact, that I don’t remember when or where the talk was. What I do remember is her telling the story of designing… | Continue reading
With over 2 billion devices running Android, it is one of the most used operating systems on the planet. Android development follows software product lines approach and so is used in multiple busin… | Continue reading
Introducing the Computer Architecture Podcasts: a series of conversations on cutting-edge work in computer architecture and the remarkable people behind it. Listen to the first episode with Dr. Kim… | Continue reading
One of the long-standing debates in computer systems is the shared nothing vs shared memory debate. Should parallel computers provide the illusion of shared memory or should they do away with suppo… | Continue reading
More than a decade ago, the pioneering computer scientist Jim Gray envisioned a fourth paradigm of scientific discovery that uses computers to solve data-intensive scientific problems. Today, scien… | Continue reading
The past five years have seen a significant change in the way cloud applications are designed. In place of large monolithic services, where the functionality of an entire application like a social … | Continue reading
Hundreds of computer architects convened in the beautiful city of Columbus, Ohio to celebrate the 52nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). Led by general chairs Ra… | Continue reading
This blog post gives a glimpse of the computer systems research papers presented at the USENIX Annual Technical Conference (ATC) 2019, with an emphasis on systems that use new hardware architectur… | Continue reading
RE-gem5 is a directed effort to rejuvenate the underlying infrastructure of gem5. RE-gem5 is not a new simulator or a new project; it is a project to enhance and support the current gem5 infrastruc… | Continue reading
The demand for computing performance continues to grow exponentially in part due to video and machine learning processing for applications like augmented/virtual reality and self-driving vehicles. … | Continue reading
Many works present their results; this blog post seeks to aid you in developing your own great results, especially in computer architecture and systems. I learned these lessons over a career leadin… | Continue reading
On July 22-23rd, UC San Diego’s Non-Volatile Systems Laboratory and the Storage Networking Industry Association (SNIA) hosted the first Persistent Programming In Real Life (PIRL). PIRL is a new mee… | Continue reading
Recently, we conducted a detailed study of some notable publication trends at ISCA. We used the abstracts for all the papers published at ISCA from 1973, when it was inaugurated, to 2018. This blog… | Continue reading
In 2009, Dr. Atul Gawande, a surgeon at Brigham and Women’s Hospital in Boston, published The Checklist Manifesto: How to Get Things Right, describing his experience using checklists to redu… | Continue reading
The past few years have seen an unprecedented increase in the number of systems targeting machine learning (ML) applications and deep learning in particular (Jeff Dean has compiled a telling graph … | Continue reading
Data management research has recently been paying more attention on how to run machine learning algorithms efficiently on massive datasets. This blog post focuses on three recent research papers th… | Continue reading
Reconfigurable field effect transistors (RFET) is expected to offer a lower transistor count and decreased area consumption compared to conventional CMOS. While the semiconductor industry is moving… | Continue reading
This is a time of great interest in new hardware. Computers are becoming much more complex. The multicore era has given way to increasingly heterogeneous computing platforms. Modern SoCs contain a … | Continue reading
Editors Note: This is the second of two independent posts on the performance of Intel’s new memory technology. For the last ten years, researchers have been anticipating the arrival of commer… | Continue reading
Background These are exciting and challenging times for computer architects. The looming end of Moore’s law and the breakdown of Dennard scaling force everybody to put on their thinking caps … | Continue reading
It isn’t every day that a major company throws in the towel on Moore’s Law, so it is worth noting the announcement by GLOBALFOUNDRIES (GF) to halt development of the 7nm process node. W… | Continue reading
The security community will remember the year of 2018 as the year of speculative execution attacks. Meltdown and Spectre, the recent Foreshadow (L1TF in Intel’s terminology), and their varia… | Continue reading
The term “von Neumann bottleneck” was coined by John Backus in his 1978 Turing Award lecture to refer to the bus connecting the CPU to the store in von Neumann architectures. In this lecture, he ar… | Continue reading
Spectre and Meltdown opened the Pandora box of a new class of speculative execution attacks that defeat standard memory protection mechanisms. These attacks are not theoretical, they pose a real an… | Continue reading
I recently went through old files in preparation for the Turing Award Lecture on June 4, and discovered a paper that was rejected by IEEE Computer yet was a stepping stone to Reduced Instruction Se… | Continue reading
Neural networks are transforming AI and will impact our society in ways we can’t begin to imagine. The possibilities are endless: from autonomous vehicles to revolutionizing healthcare. The hardwar… | Continue reading
It’s a marvelous time in computer systems. For me, working in Deep Learning feels like living through a scientific revolution. Kuhn described this kind of change in his classic book, where a new pa… | Continue reading