Communications of the ACM.

Communications of the ACM. - New York : Association for Computing Machinery (ACM), 2020 - 112 pages : color illustrations, 28 cm.

Includes bibliographical references.

A computational lens on economics -- Challenge yourself by reaching for the highest bar -- Computing's role in climate warming -- Transitioning to distance learning and virtual conferencing -- The quantum threat -- Your wish is my CMD -- Reducing and eliminating e-waste -- AI authorship? -- Proposal: a market for truth to address false ads on social media -- For impactful community engagement: check your role -- Consumers vs. citizens in democracy's public sphere -- Call for a wake standard for artificial intelligence -- The best place to build a subway -- Demystifying stablecoins -- Domain-specific hardware accelerators -- The data science life cycle: a disciplined approach to advancing data science as a science -- A domain-specific supercomputer for training deep neural networks -- Some simple economics of the blockchain -- Technical perspective: Why 'correct' computers can leak your information -- Spectre attacks: exploiting speculative execution -- Technical perspective: ASIC clouds: specializing the datacenter -- ASIC clouds: specializing the datacenter for planet-scale applications -- Strategic paddling.

[Article Title: A computational lens on economics / Moshe Y. Vardi, Pages 5] ;[Article Title: Challenge yourself by reaching for the highest bar / Yosuke Ozawa, p. Page 7] ;[Article Title: Computing's role in climate warming / CACM Staff, Page 9] ;[Article Title: Transitioning to distance learning and virtual conferencing / John Arquilla and Mark Guzdial, Pages 10-11] Abstract: The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.;[Article Title: The quantum threat / Gregory Mone, Pages 12-14] Abstract: Cryptographers are developing algorithms to ensure security in a world of quantum computing. ;[Article Title: Your wish is my CMD / Neil Savage, Pages 15-16] Abstract: Artificial intelligence could automate software coding.;[Article Title: Reducing and eliminating e-waste / Keith Kirkpatrick, Pages 17-19] Abstract: We need to mitigate the environmental impact of disposing of electronics at their end of useful life.;[Article Title: Reducing and eliminating e-waste / Keith Kirkpatrick, Pages 17-19] Abstract: We need to mitigate the environmental impact of disposing of electronics at their end of useful life.;[Article Title: AI authorship? / Pamela Samuelson, Pages 20-22] Abstract: Considering the role of humans in copyright protection of outputs produced by artificial intelligence.;[Article Title: Proposal: a market for truth to address false ads on social media / Marshall W. Van Alstyne, Pages 23-25] Abstract: Guaranteeing truth in advertising. ;[Article Title: For impactful community engagement: check your role / Kathleen H. Pine, Margaret M. Hinrichs, Jieshu Wang,and Dana Lewis,Erik Johnston, Pages 26-28] Abstract: Toward a more equitable distribution of the benefits of technological change.;[Article Title: Consumers vs. citizens in democracy's public sphere / Allison Stanger, Pages 29-31] Abstract: Attempting to balance the challenging trade-offs between individual rights and our obligations to one another.;[Article Title: Call for a wake standard for artificial intelligence / Brian Subirana, Pages 32-35] Abstract: Suggesting a Voice Name System (VNS) to talk to any object in the world.;[Article Title: The best place to build a subway / Pat Helland, Pages 36-39] Abstract: Building projects despite (and because of) existing complex systems.;[Article Title: Demystifying stablecoins / Jeremy Clark, Didem Demirag, Seyedehmahsa Moosavi, Pages 40-46] Abstract: Cryptography meets monetary policy.;[Article Title: Domain-specific hardware accelerators / William J. Dally, Yatish Turakhia, and Song Han, Pages 48-57] Abstract: DSAs gain efficiency from specialization and performance from parallelism.;[Article Title: The data science life cycle: a disciplined approach to advancing data science as a science / Victoria Stodden, Pages 58-66] Abstract: A cycle that traces ways to define the landscape of data science.;[Article Title: The data science life cycle: a disciplined approach to advancing data science as a science / Victoria Stodden , Pages 58-66] Abstract: A cycle that traces ways to define the landscape of data science.;[Article Title: A domain-specific supercomputer for training deep neural networks / Norman P. Jouppi, and seven others, Page 67-78] Abstract: Google's TPU supercomputers train deep neural networks 50x faster than general-purpose supercomputers running a high-performance computing benchmark.;[Article Title: Some simple economics of the blockchain / Christian Catalinia and Joshua S. Gans, Pages 80-90] Abstract: Blockchain technology can shape innovation and competition in digital platforms, but under what conditions?;[Article Title: Technical perspective: Why 'correct' computers can leak your information / Mark D. Hill, Pages 92] ;[Article Title: Spectre attacks: exploiting speculative execution / Paul Kocher, and 11 others, Pages 93-101] Abstract: Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try to guess the destination and attempt to execute ahead. When the memory value finally arrives, the CPU either discards or commits the speculative computation. Speculative logic is unfaithful in how it executes, can access the victim's memory and registers, and can perform operations with measurable side effects. Spectre attacks involve inducing a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim's confidential information via a side channel to the adversary. This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim's process. More broadly, the paper shows that speculative execution implementations violate the security assumptions underpinning numerous software security mechanisms, such as operating system process separation, containerization, just-in-time (JIT) compilation, and countermeasures to cache timing and side-channel attacks. These attacks represent a serious threat to actual systems because vulnerable speculative execution capabilities are found in microprocessors from Intel, AMD, and ARM that are used in billions of devices. Although makeshift processor-specific countermeasures are possible in some cases, sound solutions will require fixes to processor designs as well as updates to instruction set architectures (ISAs) to give hardware architects and software developers a common understanding as to what computation state CPU implementations are (and are not) permitted to leak. ;[Article Title: Technical perspective: ASIC clouds: specializing the datacenter / Parthasarathy Ranganathan, Pages 102] ;[Article Title: ASIC clouds: specializing the datacenter for planet-scale applications / Michael Bedford Taylor and five others, Pages 103-109] Abstract: Planet-scale applications are driving the exponential growth of the Cloud, and datacenter specialization is the key enabler of this trend. GPU- and FPGA-based clouds have already been deployed to accelerate compute-intensive workloads. ASIC-based clouds are a natural evolution as cloud services expand across the planet. ASIC Clouds are purpose-built datacenters comprised of large arrays of ASIC accelerators that optimize the total cost of ownership (TCO) of large, high-volume scale-out computations. On the surface, ASIC Clouds may seem improbable due to high NREs and ASIC inflexibility, but large-scale ASIC Clouds have already been deployed for the Bitcoin cryptocurrency system. This paper distills lessons from these Bitcoin ASIC Clouds and applies them to other large scale workloads such as YouTube-style video-transcoding and Deep Learning, showing superior TCO versus CPU and GPU. It derives Pareto-optimal ASIC Cloud servers based on accelerator properties, by jointly optimizing ASIC architecture, DRAM, motherboard, power delivery, cooling, and operating voltage. Finally, the authors examine the impact of ASIC NRE and when it makes sense to build an ASIC Cloud.;[Article Title: Strategic paddling / Dennis Shasha, Pages 112-ff] Abstract: Choosing how to best navigate turbulent current events.

0001-0782


INFORMATION TECHNOLOGY