<http://webisa.webdatacommons.org/prov/266379526>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/259831177> .
<http://webisa.webdatacommons.org/259831177>	<http://www.w3.org/ns/prov#wasQuotedFrom>	<slashdot.org> .
<http://webisa.webdatacommons.org/259831177>	<http://www.w3.org/1999/02/22-rdf-syntax-ns#type>	<http://www.w3.org/ns/prov#Entity> .
<http://webisa.webdatacommons.org/259831177>	<http://www.w3.org/ns/prov#value>	"by vux984 (928602) writes: Except that volatile means that the memory might be accessed through methods other than the program, Exactly right.The trouble is in the case of a bug or vulnerability, even non-volatile memory might be accessed/updated when its not supposed to be." .