We consider related work along two axes: operating system architectures, and techniques for isolating untrusted code.