This modern successor to C enforces ownership and borrowing rules at compile time, preventing use-after-free and data-race bugs.
What is Rust?
This modern Linux-based hypervisor is integrated into the kernel and forms the basis of most enterprise virtualization stacks.
What is KVM (Kernel-based Virtual Machine)?
This error-correction technology protects spacecraft memory from radiation by performing Single Error Correction / Double Error Detection, with Cassini-Huygens logging about 280 single-bit flips per day.
What is EDAC (Error Detection and Correction)?
The 1988 Internet worm that led to the creation of CERT/CC and infected roughly 10% of the Internet at the time.
What is the Morris Worm?
Network / OS
These circuit components store or dissipate energy but provide no power gain; early integrated circuits were revolutionary for combining them with transistors on a single die.
What are passive elements (resistors and capacitors)?
This high-assurance language, often paired with SPARK, is used in avionics and aerospace because it supports formal verification of safety-critical code.
What is Ada?
This Microsoft virtualization platform supports nested virtualization and integration with Windows Server environments.
What is Hyper-V?
Cryptographic implementations that remain stable during background memory correction cycles are called this, ensuring scrubbing doesn’t trigger false attestation failures.
What is scrub-aware cryptography?
This 2015 QEMU vulnerability, named for “Virtualized Environment Neglected Operations Manipulation,” let VMs execute code on the host.
What is VENOM (CVE-2015-3456)?
Virtualization
This 1974 scaling rule stated that voltage and current could shrink proportionally with transistor size, keeping power density constant until leakage ended the trend.
What is Dennard scaling?
This language’s runtime model isolates goroutines and channels to prevent shared-state concurrency vulnerabilities.
What is Go?
By virtualizing hardware at the processor level, hypervisors implement this isolation principle that prevents guest VMs from directly accessing host memory.
What is memory and I/O isolation?
Operating at 2–4 GHz, this radio band is the workhorse of spacecraft telemetry because it penetrates atmosphere reliably and resists rain fade.
What is the S-band?
Exploiting speculative CPU behavior, this 2018 vulnerability leaks privileged data via cache timing side-channels.
What is Spectre?
CPU / Microarchitecture
ARM follows this instruction-set philosophy that emphasizes simpler, uniform instructions for efficiency, while Intel’s x86 historically used its complex opposite. (2 answers for this)
What is RISC vs. CISC architecture?
This Kubernetes configuration language declaratively defines system states but requires policy enforcement tools like OPA or Kyverno for secure validation.
What are YAML files (in Kubernetes manifests)?
This open-source technology provides lightweight virtualization without a hypervisor, instead relying on namespaces and cgroups. It does not provide security isolation without hardware pairing.
What are containers (e.g., Docker, Podman, LXC)?
Offering up to 500 Mbps throughput but suffering rain fade, this 26.5–40 GHz band underpins broadband constellations such as Starlink.
What is the Ka-band?
By rapidly activating DRAM rows, this 2014 hardware attack flips adjacent memory bits, compromising integrity.
What is Rowhammer?
(flip feng-shui also valid)
Hardware / DRAM
Running transistors just above threshold voltage to achieve order-of-magnitude energy savings defines this ultra-efficient computing regime.
What is near-threshold voltage (NTV) computing?
This toolset verifies program correctness using theorem proving, as seen in CompCert, a formally verified C compiler.
What are formal methods?
In cloud security, the struggle between transparency for users and confidentiality for providers reflects this broader political problem of cloud governance.
What is the trust asymmetry of virtualization?
Founded in 1982, this international body develops space-data standards like packet telemetry and compression; rival frameworks such as China’s GB/T and Russia’s GOST mirror geopolitical divisions.
What is the CCSDS (Consultative Committee for Space Data Systems)?
Manipulating satellite timing and position data to mislead navigation receivers describes this form of orbital cyberattack.
What is GPS / GNSS Spoofing?
Satellite / Network
To improve yield and mix process technologies, modern systems assemble smaller dies with interconnect standards like UCIe, a practice known as this.
What is chiplet-based heterogeneous integration?