From mboxrd@z Thu Jan 1 00:00:00 1970 From: erik quanstrom Date: Tue, 27 Apr 2010 08:46:22 -0400 To: 9fans@9fans.net Message-ID: <74bab30800fb07a2511d904bb2ea4b95@kw.quanstro.net> In-Reply-To: References: <23E784B6-F189-4DFC-AA82-21CA950DD77D@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Subject: Re: [9fans] Distributed Pipelines Topicbox-Message-UUID: 0f8e1398-ead6-11e9-9d60-3106f5b1d025 On Tue Apr 27 00:31:03 EDT 2010, newsham@lava.net wrote: > What about some mounting/binding hackery where you replace > /dev/cons so that the original "cpu" command works? why the resistance to il? rx is a good example of il's strengths. in order for cpu to work, it uses 2 extra processes. rx is much more efficient. (and 1/4 the code) great for your trusted network. or perhaps your local supercomputer. rx doesn't do encryption. a srx using ssl/tls would be able to sneak a 0 write through since the record layer should expand that into a application record with application data length of 0. - erik