Just took a look at the architecture doc; complicated.

Could use pictures, and more clear decomposition.

Of course you'd introduce the layers in some order, and then could
later discuss why you layered them in that order.

I assume the capabilities are lik capability-based security, but
the introduction as short ASCII strings is kinda confusing.

Yeah I know, I'm all critcism... I'll work on that once I sorta figure
it out.  But sometimes if you work with something too much you forget
what it's like to not know, so maybe this is handy.
-- 
It asked me for my race, so I wrote in "human". -- The Beastie Boys
My emails do not have attachments; it's a digital signature that your mail
program doesn't understand. | http://www.subspacefield.org/~travis/ 
If you are a spammer, please email [email protected] to get blacklisted.

Attachment: pgpBXCpzwPhsA.pgp
Description: PGP signature

_______________________________________________
tahoe-dev mailing list
[email protected]
http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev

Reply via email to