<http://webisa.webdatacommons.org/prov/266379526> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/259831177> . <http://webisa.webdatacommons.org/259831177> <http://www.w3.org/ns/prov#wasQuotedFrom> <slashdot.org> . <http://webisa.webdatacommons.org/259831177> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://www.w3.org/ns/prov#Entity> . <http://webisa.webdatacommons.org/259831177> <http://www.w3.org/ns/prov#value> "by vux984 (928602) writes: Except that volatile means that the memory might be accessed through methods other than the program, Exactly right.The trouble is in the case of a bug or vulnerability, even non-volatile memory might be accessed/updated when its not supposed to be." .