The Capability Hardware Enhanced RISC Instructions (CHERI) project is a rethinking of computer [...]| LWN.net
Thoughts on (Amazonian) Leadership| www.daemonology.net
One of life’s great pleasures is trust: having confidence in another person| tratt.net
Protecting devices from malicious use is often a cat-and-mouse game between security researchers identifying software vulnerabilities (CVEs) and product-makers patching them before attackers can exploit them. As a result, devices can no longer be developed, shipped and forgotten. Instead, manufacturers must commit to keeping those devices up to date and free from critical vulnerabilities for …| www.thegoodpenguin.co.uk
My re:Invent asks| www.daemonology.net
Our central processor unit (CPU) architecture comes in three varieties optimized for different use cases: A-Profile for rich applications, , R-Profile for Real-time, and M-Profile for microcontrollers| Arm | The Architecture for the Digital World