{"version":"1.0","provider_name":"Les aventures de Jos\u00e9 ...","provider_url":"https:\/\/joselinformatique.obip.fr","author_name":"pierre","author_url":"https:\/\/joselinformatique.obip.fr\/index.php\/author\/pierre\/","title":"CISC vs RISC - Les aventures de Jos\u00e9 ...","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"34dcmDIKER\"><a href=\"https:\/\/joselinformatique.obip.fr\/index.php\/2024\/09\/15\/cisc-vs-risc\/\">CISC vs RISC<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/joselinformatique.obip.fr\/index.php\/2024\/09\/15\/cisc-vs-risc\/embed\/#?secret=34dcmDIKER\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0CISC vs RISC\u00a0\u00bb &#8212; Les aventures de Jos\u00e9 ...\" data-secret=\"34dcmDIKER\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/joselinformatique.obip.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/joselinformatique.obip.fr\/wp-content\/uploads\/2019\/11\/pexels-photo-577585.jpg","thumbnail_width":1734,"thumbnail_height":1300,"description":"J\u2019ai d\u00e9j\u00e0 abord\u00e9 le sujet. Et je me suis tromp\u00e9. Les Motorola 68000 sont des processeurs CISC et non des RISC comme je l\u2019\u00e9cris dans l\u2019article \u201cLa ligue majeure\u201d. C\u2019est r\u00e9tabli. Alors quelle diff\u00e9rence entre les 2 types d\u2019architectures de processeurs ? Et pourquoi ces 2 logiques ont autant d\u2019importance dans l\u2019informatique actuelle ? Pour [&hellip;]"}