we found it's a lot easier doing it like in the octopus. we'll be happy to discuss any of it.
Did you find 9p adequate for the resource sharing you did or did you have to alter the protocol or augment it with other protocols? Did you use the normal plan9 authentication mechanisms or did you explore other authentication alternatives? Were all machines in a shared authentication domain or did you support multiple authentication domains? What did you do about machine or resource discovery? Is there a mechanism to discover when machines or resources are added or removed from the network? What papers do you recommend looking at? Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com
