*Throwing in keywords for search:* assembly, asm, x86, arm, powerpc, thumb, sparc, mips, risc, cisc, 8086, 186, 286, i386, i486, p5, p6, netburst, core, nehalem, sandy bridge, haswell, broadwell, larrabee, bonnell, moore, noyce, fairchild, motorola, amd, k5, k6, k7, k8, k10, turion, fusion, bobcat, bulldozer, cortex, intel, marvell, xmos, masm, opcode, uop, cache, lookup, hyper threading, multi threading, ooo, out-of-order, out of order, branch, prediction, predication, scalar
Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited the classical example of encrypting messages so that only the key-holder can read it. Cryptography lives at an intersection of math, programming, and computer science. This subreddit covers the theory and practice of modern and *strong* cryptography, and it is a technical subreddit focused on the algorithms and implementations of cryptography.
Submit screenshots of all your *NIX desktops, themes, and nifty configurations, or submit anything else that will make ricers happy. Maybe a server running on an Amiga, or a thinkpad signed by Bjarne Stroustrup? Show the world how sexy your computer can be!
This sub is dedicated to discussion and questions about embedded systems: "a controller programmed and controlled by a real-time operating system (RTOS) with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints."