we found it's a lot easier doing it like
in the octopus. we'll be happy to
discuss any of it.

Did you find 9p adequate for the resource sharing you
did or did you have to alter the protocol or augment it
with other protocols?

Did you use the normal plan9 authentication mechanisms or
did you explore other authentication alternatives?  Were
all machines in a shared authentication domain or did you
support multiple authentication domains?

What did you do about machine or resource discovery?
Is there a mechanism to discover when machines or resources
are added or removed from the network?

What papers do you recommend looking at?

Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com

Reply via email to