Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's easier to emulate CISC with RISC than the other way around. CISC instructions break down into RISC instructions but detecting which RISC instructions can be added together into a complex CISC instruction is much harder (though I'd note that RISCV attempts to fuse certain instructions as an optional optimization).


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: