Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This kind of extends to embedded/low level systems programming as well - the assumption that memory can only change as an effect of program execution just does not hold true there. What's the value of tracking mutability and data ownership when a DMA engine can just decide to overwrite the memory you supposedly have exclusive access to?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: