Ed Davies @edavies@octodon.social
Follow

@cynicalsecurity @thamesynne Right, but my recollection/understanding was that it tended to split execution up much more granularly than the Unix/Windows process model making hardware exploitation of locality easier.

· Web · 0 · 0