Just took a look at the architecture doc; complicated. Could use pictures, and more clear decomposition.
Of course you'd introduce the layers in some order, and then could later discuss why you layered them in that order. I assume the capabilities are lik capability-based security, but the introduction as short ASCII strings is kinda confusing. Yeah I know, I'm all critcism... I'll work on that once I sorta figure it out. But sometimes if you work with something too much you forget what it's like to not know, so maybe this is handy. -- It asked me for my race, so I wrote in "human". -- The Beastie Boys My emails do not have attachments; it's a digital signature that your mail program doesn't understand. | http://www.subspacefield.org/~travis/ If you are a spammer, please email [email protected] to get blacklisted.
pgpBXCpzwPhsA.pgp
Description: PGP signature
_______________________________________________ tahoe-dev mailing list [email protected] http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev
