Four short links: 29 May 2020
Confidential Computing, Systems, Visual Programming, and Deno
- Confidential Computing — Confidential computing uses hardware-based techniques to isolate data, specific functions, or an entire application from the operating system, hypervisor or virtual machine manager, and other privileged processes. Data is stored in the trusted execution environment (TEE), where it’s impossible to view the data or operations performed on it from outside, even with a debugger. The TEE ensures that only authorized code can access the data. If the code is altered or tampered with, the TEE denies the operation. (via John Gossman
- Six Levels of Interaction with a System — The six levels of interaction with a system are: Non-use; Use; Monitor; Maintain; Repair; and (Re)build. (via Charlie Harrington)
- Deno is a Browser for Code — Interesting thoughts on trust, dependencies, and discovery in Deno vs Node.