Wow, I just admire how he exploit problems and uses it to generate new innovations. There is an opportunity for the next BIG THING.
@muhammadgamal90713 жыл бұрын
I cannot find a word to describe my gratitude for your generosity that is more precise and definitive than thank you professor.
@Redaxi Жыл бұрын
Hocam bilkentte 2. sınıf cs öğrencisiyim cs223 dersim için bu serinizi izliyorum çok teşekkürler çok net ve güzel anlatmışsınız gerçekten.
@runggp Жыл бұрын
really can feel the energy of prof Onur Mutlu which makes the lectures so fun and motivational!
@feribabahir4 жыл бұрын
Dear Onur Mutlu thank you very much for the relevant, educational, and interesting Lectures. I am a IT-lawyer and I enjoy very much your lectures.
@JonMasters3 жыл бұрын
Thanks for the shoutout to our video on Meltdown and Spectre! I gave a long form lecture on it for FOSDEM 2018 as the keynote also
@Oingoboingo7104 жыл бұрын
We're waiting for the new lecture professor Onur! Thank you so much.
@saikashyapkurella82992 жыл бұрын
Great initiative to share the amazing knowledge you have. Thank you very much Professor!! :)
@Tracks7774 жыл бұрын
awesome content
@LuffyGearSecond23 жыл бұрын
Thanks from Mexico, your lectures are great!
@gitgudsec2 жыл бұрын
You are an incredible teacher, I love this so much ❤
@tiger40862 жыл бұрын
interesting lecture!!!
@dwein0084 жыл бұрын
Thanks from Colombia.
@ervaucher3 жыл бұрын
Dear Onur Mutlu, First of all, thank you for your amazing content. Just a speculative question about speculative execution and Spectre attacks. I couldn't find the answer anywhere in the documentation. Wouldn't it be possible to defend these kinds of attacks by measuring to an infinitely precise level the time needed to execute a particular program given a particular set of inputs and to consider any significant deviation from this timing as a potential sign of an attack ? I assume that a considerable Spectre attack would require a certain amount of conditional branches to be executed in order to fetch valuable information, and given this that the time deviation from the standard execution would be visible (as long as we work with extremely precise timings and that we control almost every parameter of the execution). If it is a current area of research, would you be so kind to provide links to sources describing these "timing" defence mechanisms ? Sincerely yours, Elliot.
@JonMasters3 жыл бұрын
Rowhammer on CXL would be interesting - hopefully everyone has working ECC
@isthereanyname3 жыл бұрын
very good on the attacks
@YosseufHassan8 ай бұрын
Amazing how much content you put here for free, but is there any prerequistes before seeing this course? like electrical knowledge?
@areejahmad39982 жыл бұрын
where can i watch lab video?
@TheFalsoblanco2 жыл бұрын
How do the labs look like ?
@lancelotrampaculan20752 жыл бұрын
At what year level are his students? anyone knows?
@ramiadel55894 жыл бұрын
جامد
@minhtoannguyen18623 жыл бұрын
1:04:30
@TheFalsoblanco3 жыл бұрын
Why is not a solution for Row Hamering just go back and do what we did in 2008-2010 with seperated cell are the trade offs so terrible that this solution sounds so unlikeable?
@giorgosK936 Жыл бұрын
speed
@umutcagatay5597 Жыл бұрын
Because it requires much more space than it ever had so we wouldn't have devices which are as little-sized as mobile phones that fits in our pockets. Also it decreases the speed and performance which are the most significiant demands in technology science rn.