Tools: โค๏ธโ€๐Ÿ”ฅ VIKRAM (32-bit) & DHRUV64 (64-bit): Indiaโ€™s Indigenous Processors for Space ๐Ÿ›ฐ and Defence ๐Ÿ”ฐ

Tools: โค๏ธโ€๐Ÿ”ฅ VIKRAM (32-bit) & DHRUV64 (64-bit): Indiaโ€™s Indigenous Processors for Space ๐Ÿ›ฐ and Defence ๐Ÿ”ฐ

Source: Dev.to

โœจ Introduction: A Dual-Architecture Strategy, Not a Transition ## RISC-V Alignment: Why it matters for Sovereign Computing ๐Ÿ”ง โ‰๏ธ ## Mapping the Architectures ๐Ÿ—๏ธ ## Why Space ๐Ÿš€ & Defence ๐Ÿ›ก๏ธ Demand Indigenous Processors ๐Ÿ”ณ ## VIKRAM (32-bit) ๐Ÿ”ณ: Embedded Control for Space ๐Ÿš€ & Defence ๐Ÿ›ก๏ธ ## VIKRAM ๐Ÿ”ณ Architectural Characteristics โœจ ## Typical Deployment ๐Ÿ› ๏ธ Domains ## Bare-Metal Deterministic Control Example ๐Ÿ“œ ## DHRUV64 (64-bit) ๐Ÿ”ณ : Indiaโ€™s First Indigenous 64-bit Microprocessor ## DHRUV64 ๐Ÿ”ณ Architectural Focus ๐ŸŽฏ ## Secure Boot and Trust Establishment ๐Ÿ’ฏ ## Software Ecosystem Enablement ## RTOS vs Linux: Correct OS Pairing ๐Ÿงช ## VIKRAM ๐Ÿ”ณ vs DHRUV64 ๐Ÿ”ณ : Architectural ๐Ÿ—๏ธ Comparison ## Security ๐Ÿ”’ : Hardware Is the First Trust Anchor ## Security ๐Ÿ›ก๏ธ Threat Model: Defence-Grade Thinking ๐Ÿง  ## Architectural ๐Ÿ—๏ธ Mitigations ## Self-Reliance Is an Ecosystem, Not a Single Chip ๐Ÿ”ณ ## A Deliberate Dual-Architecture Strategy ## Final Thoughts ๐Ÿ’ก: For decades โณ, space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ systems around the world ๐ŸŒ have relied on a heterogeneous ๐Ÿงฝ mix of processors ๐Ÿ”ณ each carefully chosen for determinism โ™พ๏ธ, reliability ๐Ÿ’ช, security ๐Ÿ”’, and lifecycle guarantees ๐Ÿ’ฏ, not ๐Ÿšซ marketing trends or ๐Ÿ“Š raw performance charts ๐Ÿ“ˆ. Indiaโ€™s computing journey ๐Ÿž in this domain now enters a decisive phase with the introduction of two indigenous processor ๐Ÿ”ณ architectures ๐Ÿ—๏ธ : VIKRAM (32-bit) ๐Ÿ”ณ : Engineered for mission-critical embedded control in space ๐Ÿ›ฐ and defence ๐Ÿ”ฐ systems DHRUV64 (64-bit) ๐Ÿ”ณ : Indiaโ€™s first indigenous 64-bit general-purpose processor ๐Ÿ”ณ, designed for secure ๐Ÿ”’, high-performance computing ๐Ÿš€. This is not ๐Ÿšซ a story of ๐Ÿค– technological evolution ๐Ÿ’ก from 32-bit to 64-bit. It is a story of intentional โœจ architectural coexistence. In real-world ๐ŸŒŽ space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ platforms, processors ๐Ÿ”ณ are selected based on determinism โš›, power envelopes ๐Ÿ“ฟ, security guarantees ๐Ÿ”’ , and certification effortโ€”not bit-width alone. Control systems ๐ŸŽ›๏ธ, avionics โœˆ๏ธ, guidance loops, and mission computers ๐Ÿ–ง solve fundamentally different problems, and therefore demand different architectural ๐Ÿ—๏ธ answers. This article ๐Ÿ“œ explores how VIKRAM ๐Ÿ”ณ and DHRUV64 ๐Ÿ”ณ, aligned with RISC-V principles โš–๏ธ, form a deliberate dual-architecture strategyโ€” one that prioritizes trust ๐Ÿ’ฏ, predictability โœจ, and sovereign control โšก๏ธ across Indiaโ€™s space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ computing stack. This is โค๏ธโ€๐Ÿ”ฅ Hemant Katta โš”๏ธ So letโ€™s dive deep ๐Ÿง  into the engineering ๐Ÿ› ๏ธ decisions, trade-offs โ„ข, and system-level thinking ๐Ÿ’ก behind this approach. Indiaโ€™s space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ ecosystem has reached a critical milestone ๐Ÿšฉ with the introduction of two indigenous processor ๐Ÿ”ณ architectures: These processors do not represent a migration from 32-bit to 64-bit. They are purpose-built architectures, designed to operate at different layers of the same system stack. In space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ engineering, coexistence of architectures ๐Ÿ—๏ธ is intentional and permanent ๐Ÿ’ฏ. Performance ๐Ÿš€, determinism โ™พ๏ธ, power ๐Ÿ”‹, security ๐Ÿ”’, and lifecycle ๐Ÿ”„ constraints dictate processor ๐Ÿ”ณ choice โ€” not bit-width alone. Both VIKRAM ๐Ÿ”ณ and DHRUV64 ๐Ÿ”ณ align naturally with RISC-V design philosophy. Why RISC-V Is Strategically Relevant โ‰๏ธ For defence ๐Ÿ›ก๏ธ systems, ISA transparency is as important as performance. Example ๐Ÿ“œ: Minimal RISC-V Control Loop (VIKRAM ๐Ÿ”ณ-Class) : RISC-Vโ€™s simplicity supports predictable timing โณ analysis, critical for flight โœˆ๏ธ systems. Unlike commercial computing, space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ systems operate under constraints such as: Foreign processors often introduce: Indigenous processor architectures ๐Ÿ—๏ธ enable full ๐Ÿ’ฏ control over the trust boundary, starting at silicon. Why 32-bit Is Still Essential โ‰๏ธ In high-assurance systems, 32-bit architectures ๐Ÿ”ณ remain the preferred choice for embedded control. In mission-critical systems, priorities ๐ŸŽฏ are: 32-bit ๐Ÿ”ณ architectures reduce: A smaller architectural ๐Ÿ—๏ธ surface reduces unknown failure modes, This makes them ideal for safety-certified systems. A VIKRAM-class ๐Ÿ”ณ processor typically emphasizes ๐ŸŽฏ : This design philosophy prioritizes ๐Ÿ“Œ predictability over throughput. VIKRAM ๐Ÿ”ณ is well-suited for: In these systems, missing a real-time โŒ› deadline is a system failure ๐Ÿ’ฅ. This style of programming ๐Ÿ‘จโ€๐Ÿ’ป benefits directly from: Why 64-bit Is Essential โ‰๏ธ Modern Space ๐Ÿš€ & Defence ๐Ÿ›ก๏ธ missions demand: These requirements demand 64-bit ๐Ÿ”ณ addressability and modern OS ๐ŸชŸ support. A DHRUV64-class ๐Ÿ”ณ processor targets: Performance is important โ€” but control and security remain primary. Indigenous silicon ensures โœ…: DHRUV64 ๐Ÿ”ณ supports a full software stack ๐Ÿ—‚๏ธ: This enables platform sovereignty โšœ๏ธ, not just hardware independence. This is a critical design decision, not a preference. VIKRAM โ†’ RTOS / Bare-Metal DHRUV64 โ†’ Linux / Secure OS Linux provides flexibility, not determinism โ€” which is acceptable at this layer. They are complementary by design. For defence ๐Ÿ›ก๏ธ systems, security ๐Ÿ”’ cannot start at the OS. Indigenous processors enable: Security ๐Ÿ›ก๏ธ becomes architectural ๐Ÿ—๏ธ, not reactive. Threat Categories Considered Security ๐Ÿ›ก๏ธ is architectural ๐Ÿ—๏ธ, not just cryptographic. Processor ๐Ÿ”ฒ sovereignty requires: Self-reliance does not mean isolation โ€” it means control over critical dependencies. VIKRAM (32-bit) ๐Ÿ”ณ and DHRUV64 (64-bit) ๐Ÿ”ณ represent a strategic, parallel architecture ๐Ÿ—๏ธ approach for Indiaโ€™s space ๐Ÿš€ & defence ๐Ÿ›ก๏ธ needs. Together ๐Ÿ”—โ€๏ธ, they form the foundation ๐ŸŒฑ of a self-dependent, secure ๐Ÿ”’, and future-ready ๐Ÿ’ฏ computing stack. In space ๐Ÿš€ & defence ๐Ÿ›ก๏ธ, the ultimate benchmark ๐ŸŽฏ is not performance charts ๐Ÿ“Š โ€” it is trust ๐Ÿ’ฏ, predictability โœจ, and control ๐Ÿ’ช. VIKRAM ๐Ÿ”ณ and DHRUV64 ๐Ÿ”ณ are not competing processors ๐Ÿ”ณ. They are complementary pillars of Indiaโ€™s sovereign computing strategy โš”๏ธ. By aligning with RISC-V, pairing the right OS to the right processor ๐Ÿ”ณ, and designing with security-first principles ๐Ÿ“œ **, India moves closer to **true technological ๐Ÿค– self-reliance in space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ systems. In these domains โœจ, the most important metric is not โณ clock speed โ€” it is trust ๐Ÿ’ฏ, predictability โœจ, and control ๐Ÿ’ช. ๐Ÿ’ฌ Whatโ€™s your take ๐Ÿค” on Indiaโ€™s sovereign 32-bit ๐Ÿ”ณ & 64-bit ๐Ÿ”ณ computing strategy โš”๏ธ? Comment ๐Ÿ“Ÿ below or tag me ๐Ÿš€ โค๏ธโ€๐Ÿ”ฅ Hemant Katta โš”๏ธ Letโ€™s debate TRUST ๐Ÿ’ฏ, PREDICTABILITY โœจ & CONTROL ๐Ÿ’ช! Templates let you quickly answer FAQs or store snippets for re-use. Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink. Hide child comments as well For further actions, you may consider blocking this person and/or reporting abuse CODE_BLOCK: // Deterministic embedded control loop ๐Ÿ”„ (RV32) void control_loop(void) { while (1) { sensor_read(); guidance_compute(); actuator_update(); } } Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: // Deterministic embedded control loop ๐Ÿ”„ (RV32) void control_loop(void) { while (1) { sensor_read(); guidance_compute(); actuator_update(); } } CODE_BLOCK: // Deterministic embedded control loop ๐Ÿ”„ (RV32) void control_loop(void) { while (1) { sensor_read(); guidance_compute(); actuator_update(); } } CODE_BLOCK: - 15โ€“30 year operational lifecycles ๐Ÿ”ƒ - Zero-failure tolerance โœจ - Deterministic real-time behavior - Strict power and thermal budgets ๐Ÿšซ - Supply-chain and export-control risks ๐Ÿšจ Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - 15โ€“30 year operational lifecycles ๐Ÿ”ƒ - Zero-failure tolerance โœจ - Deterministic real-time behavior - Strict power and thermal budgets ๐Ÿšซ - Supply-chain and export-control risks ๐Ÿšจ CODE_BLOCK: - 15โ€“30 year operational lifecycles ๐Ÿ”ƒ - Zero-failure tolerance โœจ - Deterministic real-time behavior - Strict power and thermal budgets ๐Ÿšซ - Supply-chain and export-control risks ๐Ÿšจ CODE_BLOCK: - Unverifiable microcode โš› - Opaque security mechanisms ๐Ÿ› ๏ธ - Vendor-controlled lifecycles ๐Ÿ”ƒ - Strategic dependencies ๐Ÿชค Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Unverifiable microcode โš› - Opaque security mechanisms ๐Ÿ› ๏ธ - Vendor-controlled lifecycles ๐Ÿ”ƒ - Strategic dependencies ๐Ÿชค CODE_BLOCK: - Unverifiable microcode โš› - Opaque security mechanisms ๐Ÿ› ๏ธ - Vendor-controlled lifecycles ๐Ÿ”ƒ - Strategic dependencies ๐Ÿชค CODE_BLOCK: - 32-bit RISC instruction set ๐Ÿ“œ - In-order execution pipeline - Fixed or bounded instruction latency โณ - Minimal cache hierarchy ๐Ÿ”ฐ - Strong interrupt determinism - Hardware fault-detection mechanisms ๐Ÿ› ๏ธ Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - 32-bit RISC instruction set ๐Ÿ“œ - In-order execution pipeline - Fixed or bounded instruction latency โณ - Minimal cache hierarchy ๐Ÿ”ฐ - Strong interrupt determinism - Hardware fault-detection mechanisms ๐Ÿ› ๏ธ CODE_BLOCK: - 32-bit RISC instruction set ๐Ÿ“œ - In-order execution pipeline - Fixed or bounded instruction latency โณ - Minimal cache hierarchy ๐Ÿ”ฐ - Strong interrupt determinism - Hardware fault-detection mechanisms ๐Ÿ› ๏ธ COMMAND_BLOCK: // Bare-metal control loop on a 32-bit processor # define CONTROL_PERIOD_US 1000 void control_loop(void) { while (1) { read_sensors(); compute_guidance(); update_actuators(); wait_until_next_cycle(CONTROL_PERIOD_US); } } Enter fullscreen mode Exit fullscreen mode COMMAND_BLOCK: // Bare-metal control loop on a 32-bit processor # define CONTROL_PERIOD_US 1000 void control_loop(void) { while (1) { read_sensors(); compute_guidance(); update_actuators(); wait_until_next_cycle(CONTROL_PERIOD_US); } } COMMAND_BLOCK: // Bare-metal control loop on a 32-bit processor # define CONTROL_PERIOD_US 1000 void control_loop(void) { while (1) { read_sensors(); compute_guidance(); update_actuators(); wait_until_next_cycle(CONTROL_PERIOD_US); } } CODE_BLOCK: - Predictable instruction timing โณ - Small, bounded memory ๐Ÿ’พ - Minimal OS overhead โœจ Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Predictable instruction timing โณ - Small, bounded memory ๐Ÿ’พ - Minimal OS overhead โœจ CODE_BLOCK: - Predictable instruction timing โณ - Small, bounded memory ๐Ÿ’พ - Minimal OS overhead โœจ CODE_BLOCK: - Large memory address spaces - High-resolution sensor data ๐Ÿ—ƒ๏ธ - Large memory footprints - Secure multi-process systems - Advanced cryptography ๐Ÿ›ก๏ธ - Cryptography ๐Ÿ›ก๏ธ and secure networking ๐Ÿ–ง - AI/ML ๐Ÿค– inferencing at the edge - Virtualization and isolation Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Large memory address spaces - High-resolution sensor data ๐Ÿ—ƒ๏ธ - Large memory footprints - Secure multi-process systems - Advanced cryptography ๐Ÿ›ก๏ธ - Cryptography ๐Ÿ›ก๏ธ and secure networking ๐Ÿ–ง - AI/ML ๐Ÿค– inferencing at the edge - Virtualization and isolation CODE_BLOCK: - Large memory address spaces - High-resolution sensor data ๐Ÿ—ƒ๏ธ - Large memory footprints - Secure multi-process systems - Advanced cryptography ๐Ÿ›ก๏ธ - Cryptography ๐Ÿ›ก๏ธ and secure networking ๐Ÿ–ง - AI/ML ๐Ÿค– inferencing at the edge - Virtualization and isolation CODE_BLOCK: - 64-bit RISC architecture [ i.e **RV64-class architecture** ] - Multi-core scalability - Memory Management Unit (MMU) with virtual memory - Multiple Privilege levels / execution modes - Secure boot and hardware root of trust - Cryptographic acceleration - Optional vector or SIMD extensions Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - 64-bit RISC architecture [ i.e **RV64-class architecture** ] - Multi-core scalability - Memory Management Unit (MMU) with virtual memory - Multiple Privilege levels / execution modes - Secure boot and hardware root of trust - Cryptographic acceleration - Optional vector or SIMD extensions CODE_BLOCK: - 64-bit RISC architecture [ i.e **RV64-class architecture** ] - Multi-core scalability - Memory Management Unit (MMU) with virtual memory - Multiple Privilege levels / execution modes - Secure boot and hardware root of trust - Cryptographic acceleration - Optional vector or SIMD extensions CODE_BLOCK: // Simplified secure boot flow (conceptual) void boot_sequence(void) { if (!verify_root_of_trust()) halt(); if (!verify_bootloader_signature()) halt(); if (!verify_kernel_image()) halt(); jump_to_kernel(); } Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: // Simplified secure boot flow (conceptual) void boot_sequence(void) { if (!verify_root_of_trust()) halt(); if (!verify_bootloader_signature()) halt(); if (!verify_kernel_image()) halt(); jump_to_kernel(); } CODE_BLOCK: // Simplified secure boot flow (conceptual) void boot_sequence(void) { if (!verify_root_of_trust()) halt(); if (!verify_bootloader_signature()) halt(); if (!verify_kernel_image()) halt(); jump_to_kernel(); } CODE_BLOCK: - Auditable boot ROM. - No foreign microcode. - Verifiable cryptographic implementation. - Full trust from reset vector to OS. Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Auditable boot ROM. - No foreign microcode. - Verifiable cryptographic implementation. - Full trust from reset vector to OS. CODE_BLOCK: - Auditable boot ROM. - No foreign microcode. - Verifiable cryptographic implementation. - Full trust from reset vector to OS. CODE_BLOCK: - Secure Linux or indigenous OS - Hypervisors for workload isolation - Containerized applications - AI/ML inference frameworks - Indigenous compilers and toolchains Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Secure Linux or indigenous OS - Hypervisors for workload isolation - Containerized applications - AI/ML inference frameworks - Indigenous compilers and toolchains CODE_BLOCK: - Secure Linux or indigenous OS - Hypervisors for workload isolation - Containerized applications - AI/ML inference frameworks - Indigenous compilers and toolchains CODE_BLOCK: - Hard real-time constraints - Fixed scheduling - Minimal latency - Predictable memory usage Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Hard real-time constraints - Fixed scheduling - Minimal latency - Predictable memory usage CODE_BLOCK: - Hard real-time constraints - Fixed scheduling - Minimal latency - Predictable memory usage CODE_BLOCK: // RTOS task example void guidance_task(void *arg) { while (1) { compute_guidance(); vTaskDelayUntil(&last_wake, PERIOD_MS); } } Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: // RTOS task example void guidance_task(void *arg) { while (1) { compute_guidance(); vTaskDelayUntil(&last_wake, PERIOD_MS); } } CODE_BLOCK: // RTOS task example void guidance_task(void *arg) { while (1) { compute_guidance(); vTaskDelayUntil(&last_wake, PERIOD_MS); } } CODE_BLOCK: - Multi-process workloads - User-space isolation - Networking stacks - Filesystems - AI/ML frameworks Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Multi-process workloads - User-space isolation - Networking stacks - Filesystems - AI/ML frameworks CODE_BLOCK: - Multi-process workloads - User-space isolation - Networking stacks - Filesystems - AI/ML frameworks CODE_BLOCK: - Verifiable RTL and ISA - Trusted execution environments - Hardware-enforced isolation - Indigenous cryptographic primitives - Elimination of hidden dependencies Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Verifiable RTL and ISA - Trusted execution environments - Hardware-enforced isolation - Indigenous cryptographic primitives - Elimination of hidden dependencies CODE_BLOCK: - Verifiable RTL and ISA - Trusted execution environments - Hardware-enforced isolation - Indigenous cryptographic primitives - Elimination of hidden dependencies CODE_BLOCK: - Supply-chain compromise - Malicious ๐Ÿ‘พ firmware injection - Runtime privilege escalation - Side-channel leakage - Unauthorized software execution Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Supply-chain compromise - Malicious ๐Ÿ‘พ firmware injection - Runtime privilege escalation - Side-channel leakage - Unauthorized software execution CODE_BLOCK: - Supply-chain compromise - Malicious ๐Ÿ‘พ firmware injection - Runtime privilege escalation - Side-channel leakage - Unauthorized software execution CODE_BLOCK: - Indigenous toolchains (compiler, linker, debugger) - Verification & validation flows - Long-term documentation and support - Skilled engineering talent - Continuous ecosystem development Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - Indigenous toolchains (compiler, linker, debugger) - Verification & validation flows - Long-term documentation and support - Skilled engineering talent - Continuous ecosystem development CODE_BLOCK: - Indigenous toolchains (compiler, linker, debugger) - Verification & validation flows - Long-term documentation and support - Skilled engineering talent - Continuous ecosystem development CODE_BLOCK: - VIKRAM ๐Ÿ”ณ ensures deterministic, mission-critical control - DHRUV64 ๐Ÿ”ณ enables high-performance ๐Ÿš€, secure ๐Ÿ”’, sovereign computing Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: - VIKRAM ๐Ÿ”ณ ensures deterministic, mission-critical control - DHRUV64 ๐Ÿ”ณ enables high-performance ๐Ÿš€, secure ๐Ÿ”’, sovereign computing CODE_BLOCK: - VIKRAM ๐Ÿ”ณ ensures deterministic, mission-critical control - DHRUV64 ๐Ÿ”ณ enables high-performance ๐Ÿš€, secure ๐Ÿ”’, sovereign computing CODE_BLOCK: #hardware #processors ๐Ÿ”ณ #embedded #space ๐Ÿš€ #defence ๐Ÿ›ก๏ธ #riscv #systems Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: #hardware #processors ๐Ÿ”ณ #embedded #space ๐Ÿš€ #defence ๐Ÿ›ก๏ธ #riscv #systems CODE_BLOCK: #hardware #processors ๐Ÿ”ณ #embedded #space ๐Ÿš€ #defence ๐Ÿ›ก๏ธ #riscv #systems CODE_BLOCK: RISCV 'processors' Embedded 'linux' RTOS 'security' Space 'defence' Enter fullscreen mode Exit fullscreen mode CODE_BLOCK: RISCV 'processors' Embedded 'linux' RTOS 'security' Space 'defence' CODE_BLOCK: RISCV 'processors' Embedded 'linux' RTOS 'security' Space 'defence' - VIKRAM ๐Ÿ”ณ : A 32-bit processor ๐Ÿ”ณ, optimized for mission-critical space ๐Ÿš€ and defence ๐Ÿ›ก๏ธ embedded systems. - DHRUV64 ๐Ÿ”ณ : Indiaโ€™s first indigenous 64-bit general-purpose processor ๐Ÿ”ณ, targeting high-performance ๐Ÿš€ and secure computing ๐Ÿ”’. - Open and auditable ISA - No licensing or geopolitical lock-in - Modular extensions (only what you need) - Long-term architectural stability - Strong ecosystem for embedded โ†’ HPC - Minimal silicon for VIKRAM ๐Ÿ”ณ - Feature-rich but controlled expansion for DHRUV64 ๐Ÿ”ณ - Deterministic execution ๐Ÿ› ๏ธ - Simpler memory models ๐Ÿค– - Lower silicon complexity ๐Ÿงฎ - Higher reliability ๐Ÿฆพ under โ˜ข๏ธ radiation โ˜ฃ๏ธ - Ease of formal verification โœ…๏ธ - Determinism โ™พ๏ธ - Low power ๐Ÿ”‹ - Radiation tolerance โ˜ข - Verifiability โœ”๏ธ - Silicon complexity ๐Ÿงฉ - Memory unpredictability ๐Ÿšง - Validation effort ๐ŸŽฏ - Satellite ๐Ÿ›ฐ attitude determination & control systems (ADCS) - Launch vehicle avionics โœˆ๏ธ - Missile ๐Ÿš€ guidance and navigation ๐Ÿงญ - ๐Ÿ“ก Radar and communication controllers ๐Ÿ›ฐ๏ธ