IEDM 2020 Tutorial: Memory-Centric Computing Systems, Onur Mutlu, 12 December 2020

Sdílet
Vložit
  • čas přidán 22. 12. 2020
  • Speaker: Professor Onur Mutlu (people.inf.ethz.ch/omutlu/)
    Date: December 12, 2020
    Abstract and Bio: ieee-iedm.org/wp-content/uplo...
    Slides (pptx): people.inf.ethz.ch/omutlu/pub...
    Slides (pdf): people.inf.ethz.ch/omutlu/pub...
    Keynote Paper (pdf): people.inf.ethz.ch/omutlu/pub...
    IEDM 2020 Tutorials: ieee-iedm.org/program/tutorials/

Komentáře • 4

  • @manishgaur2924
    @manishgaur2924 Před 3 lety +6

    This is amazing. Thanks Prof. for sharing the playlist.

  • @skilz8098
    @skilz8098 Před 3 lety +3

    Pertaining to the entire talk I really like this talk as it is 100% relevant within today's modern technologies and their architects and designs.
    Pertaining to the content of the first part of this video and from my own intuition and understanding of mathematics, physics, chemistry, and computer systems, the one thing that I have learned throughout the decades is that no matter how many safeguards you put into place, any kind of electronic component will always be vulnerable to some kind of attack as long as our technology remains electronically based. In other words, we are bound to the underlying principles of electricity and its properties such as current and the flow of electrons. And this is why so many people are able to exploit many different types of systems using various techniques.
    The reason I have come to this conclusion is that no matter how hard one tries, the one fact that is always prevalent is that one can not stop a signal. Yes, you can stop a specific signal or reject it from going down a specific path, but you can not stop or prevent the generation of that signal. When it comes to intelligent people, if they know that the signal they have generated was blocked, they will find another way to get their signal(s) through. They'll just continue to search for new paths and eventually, they'll find an open port and that is all they'll need to get through and into a desired targetted system. This will always be an issue regardless of how advanced a system or device becomes.
    It's almost analogous to the well-known statement: "Life will always find a way!" except that when it comes to computing, "Hackers will always find a way!"

  • @prathameshnitintanksale7352

    very nice talk

  • @davidprock904
    @davidprock904 Před 3 lety

    My architecture design makes row hammer impossible to plan out.