{"id":3906,"date":"2012-04-27T14:48:29","date_gmt":"2012-04-27T19:48:29","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=3906"},"modified":"2012-04-27T14:51:06","modified_gmt":"2012-04-27T19:51:06","slug":"china-plans-national-unified-cpu-architecture","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=3906","title":{"rendered":"China plans national, unified CPU architecture"},"content":{"rendered":"<blockquote><p>According to reports from various industry sources, the Chinese government has begun the process of picking a national computer chip instruction set architecture (ISA). This ISA would have to be used for any projects backed with government money \u2014 which, in a communist country such as China, is a fairly long list of public and private enterprises and institutions, including China Mobile, the largest wireless carrier in the world. The primary reason for this move is to lessen China\u2019s reliance on western intellectual property.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.extremetech.com\/computing\/127791-china-plans-national-unified-cpu-architecture\">China plans national, unified CPU architecture | ExtremeTech<\/a>.<\/p>\n<blockquote><p>The other option, of course, is developing a brand new ISA \u2014 a daunting task, considering you have to create an entire software (compiler, developer, apps) and hardware (CPU, chipset, motherboard) ecosystem from scratch. But, there are benefits to building your own CPU architecture. China, for example, could design an ISA (or microarchicture) with silicon-level monitoring and censorship \u2014 and, of course, a ubiquitous, always-open backdoor that can be used by Chinese intelligence agencies. <strong>The Great Firewall of China is fairly easy to circumvent \u2014 but what if China built a DNS and IP address blacklist into the hardware itself?<\/strong><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>According to reports from various industry sources, the Chinese government has begun the process of picking a national computer chip instruction set architecture (ISA). This ISA would have to be used for any projects backed with government money \u2014 which, &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=3906\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[114,292,190],"class_list":["post-3906","post","type-post","status-publish","format-standard","hentry","category-technical","tag-computer-architecture","tag-cpu","tag-standards"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3906"}],"version-history":[{"count":3,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3906\/revisions"}],"predecessor-version":[{"id":3909,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3906\/revisions\/3909"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3906"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}