Explores trusted computing, confidentiality, integrity, and side-channel attacks, emphasizing real-world examples and the challenges of ensuring security.
Explores the landscape of big data, memory importance in online services, challenges faced by memory systems, emerging DRAM technologies, and storage-class memory.