Hacker News new | past | comments | ask | show | jobs | submit login

That all connects to a working end implementation, which can be presented to the patent process. ARM would need to contractually secure themselves on their own untill an implementation can be presented though



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: