Explore >> Select a destination


You are here

blog.wokwi.com
| | michaelscodingspot.com
3.1 parsecs away

Travel
| | Michael Shpilt's Blog on .NET software development, C#, performance, debugging, and programming productivity
| | www.doctormonk.com
5.8 parsecs away

Travel
| | Note. There is now a followup to this post here . The Raspberry Pi is creating quite a storm of interest. I have just got mine and one o...
| | projects.drogon.net
6.8 parsecs away

Travel
| | Page about my Arduino compatable Wiring library for the Raspberry Pi
| | danielmangum.com
31.9 parsecs away

Travel
| Isolating sensitive data and operations is a fundamental issue in computing. Ideally, we want to minimize the possibility of a software defect compromising the security of a device. However, in order for the software we write to be useful, it typically needs to interact with that sensitive data in some form or fashion. So how do we interact with sensitive data without being able to access it? The answer is that we bring only the operations that must access the sensitive data closer to the data, then force all other software to invoke those operations via some sort of interface.