WebAssembly: Yes, but for What?
Gespeichert in:
| Titel: | WebAssembly: Yes, but for What? |
|---|---|
| Autoren: | Wingo, Andy1 (AUTHOR) wingo@igalia.com |
| Quelle: | Communications of the ACM. Nov2025, Vol. 68 Issue 11, p50-54. 5p. |
| Schlagwörter: | *APPLICATION program interfaces, *ARTIFICIAL intelligence, *DATA security, SOURCE code, COMPILERS (Computer programs), BINARY codes, CLOUD computing |
| Abstract: | WebAssembly (Wasm) has proven effective for porting large C and C++ desktop applications to the Web and embedding components such as file handlers, per-pixel processors, and libraries like SQLite. Its strengths lie in use cases that require strong isolation between program components, such as browser plug-ins, virtualization, or security-critical software, while traditional web languages like JavaScript and TypeScript remain better suited for user-facing interfaces. Wasm also shows promise in cloud and confidential computing due to its fast cold-start characteristics, minimal abstraction overhead, and robust memory-safety guarantees, suggesting potential applications in operating-system drivers, isolated modules, or artificial intelligence tasks that handle sensitive data. Overall, the platform’s pattern of success points to environments where isolation, security, and controlled execution are prioritized. |
| Datenbank: | Business Source Index |
| Abstract: | WebAssembly (Wasm) has proven effective for porting large C and C++ desktop applications to the Web and embedding components such as file handlers, per-pixel processors, and libraries like SQLite. Its strengths lie in use cases that require strong isolation between program components, such as browser plug-ins, virtualization, or security-critical software, while traditional web languages like JavaScript and TypeScript remain better suited for user-facing interfaces. Wasm also shows promise in cloud and confidential computing due to its fast cold-start characteristics, minimal abstraction overhead, and robust memory-safety guarantees, suggesting potential applications in operating-system drivers, isolated modules, or artificial intelligence tasks that handle sensitive data. Overall, the platform’s pattern of success points to environments where isolation, security, and controlled execution are prioritized. |
|---|---|
| ISSN: | 00010782 |
| DOI: | 10.1145/3769473 |
Full Text Finder
Nájsť tento článok vo Web of Science