Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The "threat model" (if anyone even called it that) of applications back then was bugs resulting in unintended spin-locks, and the user not realizing they're critically short on RAM or disk space.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: