Seems like their code is downloadable.......I wonder if rackspace will close off development, but I'd probably wager they won't.
Cloud operator Rackspace has hopped over to Israel and returned with a secret weapon that could give it capabilities hard to find in Amazon and Microsoft clouds. The weapon? ZeroVM, an open-source lightweight hypervisor that presents a single-threaded environment and can be spun up in as little as 5 milliseconds. It is based …
One is behind the curve and trailing lead in the field, and incidentally, coincidentally in fields of future dreams for real in the virtually real, if reliant on dodgy foreign supply of questionably effective and efficient secret weapons [as be provided in spades with the caveat, Cloud operator Rackspace has hopped over to Israel and returned with a secret weapon that could give it capabilities hard to find in Amazon and Microsoft clouds., for they be deliveries of duds.
And does one normally find secret weapons in clouds nowadays or is it also made simpler than that for all and any who be HyperRadioProActive and AIgents and Non-State Actors in the NEUKlearer Buy Market and for the SMARTR Departments and Ministries of Defence, both Homely National and Foreign International and Alien InterNetional with Effective and Efficient Offices of Cyber Security into Sublime InterNetworking and CyberIntelAIgent Security and Virtual Protection Services ...... with QuITe Magical Promotions in Heavenly Offers [Vice free SIN] to be found on the ground in the Register? ............. http://forums.theregister.co.uk/forum/1/2013/10/25/norks_malware_ddos_south_korea/#c_2001406
And the correct answer to that/those questions is an unequivocal and resounding yes/jawohl/jawel/да/oui/是/ יאָ/ sí/نعم/כן
<http://en.wikipedia.org/wiki/Capability-based_security>. Wouldn't it be nice to just build that directly into the OS and isolate the processes using existing, well-tested, well-understood been-around-for-half-a-century virtual memory.
This would also be lots faster than kicking off a new VM with a 5ms overhead (ie 200 a second - that's got to be much slower than just starting up a new process).
Reminds me of qmail's security model <http://cr.yp.to/qmail/guarantee.html>. From what I've read, qmail starts an unprivileged per-email processes so if anything gets corrupted, it lives and dies within that process; it can't escape.
Biting the hand that feeds IT © 1998–2021