logoalt Hacker News

Joel_Mckaytoday at 2:33 PM1 replyview on HN

In such arrangements, one has essentially enforced high-latency similar context isolation using encrypted/VLAN network fabric, and pushed coordination/permissions into back-plane supervisory subsystems. Still creating a monolithic permission domain vulnerability within the entire n<10000 node cluster partition.

Likely doesn't help OS users either way. Best regards =3


Replies

convolvatrontoday at 4:00 PM

you kinda missed my point. already in the cluster the important filesystem is the distributed one. the important job management system is the distributed one. the local OS just effectively supports the single process that we really care about. so the distributed context is where we add capabilities and actually manage access and resources. that is the real OS.