@cynicalsecurity @thamesynne Right, but my recollection/understanding was that it tended to split execution up much more granularly than the Unix/Windows process model making hardware exploitation of locality easier.