Computer Architecture Today

Informing the broad computing community about current activities, advances and future directions in computer architecture.
IEEE TCuARCH Candidate Statement

IEEE TCuARCH Candidate Statement

I am running for Chair of TCuARCH because I have been part of the microarchitecture community for 32 years, appreciate greatly all the good that TCuARCH has done during that period, but recognize there is still much work to be done, and would like to lead it. TCuARCH,...

Read more...

Looking Back, Looking Ahead

Looking Back, Looking Ahead

The Year in Review The new year is upon us and it’s time to reflect on 2017 and to look ahead for 2018.  We launched Computer Architecture Today with our first Welcome post on March 19, 2017.  Since launch there have been 44 posts from 22 contributors, both our...

Read more...

Hardware Security

Hardware Security

Two high impact microarchitectural timing attacks were disclosed yesterday. (https://nyti.ms/2EOX03d). 10000 ft overview: This is a very intricate attack but the root cause is unflushed speculative state from the cache resulting in a timing variations. Apparently the...

Read more...

Elections have Consequences: Join IEEE TCuARCH and Vote!

Elections have Consequences: Join IEEE TCuARCH and Vote!

The computer architecture community is best served when its elected leadership provides strong guidance to and oversight of our flagship conferences. This has long been the case for ACM SIGARCH, which co-sponsors ISCA and ASPLOS, and IEEE TCCA, which (co-)sponsors...

Read more...

Follow-up from MICRO-50 Business Meeting

Follow-up from MICRO-50 Business Meeting

To all those who attended the MICRO business meeting diversity discussion and/or have followed it on this blog/twitter, we wanted to provide an update to the MICRO and broader computer architecture communities as to the next steps. First off, we want to thank everyone...

Read more...

Engineering Reliable Persistence

Engineering Reliable Persistence

Integrating non-volatile main memories (NVMMs) into the storage/memory hierarchy make data integrity a critical design consideration.  Protecting data in NVMM is a complex problem:  media errors and software bugs can corrupt data and the reliability of each memory...

Read more...