[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Minor things
From: |
Moritz Schulte |
Subject: |
Minor things |
Date: |
Mon, 31 Dec 2001 20:05:41 +0100 |
User-agent: |
Gnus/5.090004 (Oort Gnus v0.04) Emacs/21.1 |
Hello,
there are some minor things on the Hurd webpage
(http://www.gnu.org/software/hurd/), which can be easily fixed.
Mostly the text simply says that "the Hurd" is kernel, which it is
not.
"[...] The Hurd is not the most advanced kernel known to the planet [...]"
=> "[...] The Hurd is not the most advanded operating system (basis?)
[...]"
"it's compatible
The Hurd provides a familiar programming and user environment. For
all intents and purposes, the Hurd is a modern Unix-like kernel. The
Hurd uses the GNU C Library, [...]"
=> "[...] GNU/Hurd provides a familiar programming and user
environment. For all intents and purposes, GNU/Hurd is a modern
Unix-like operating system. GNU/Hurd uses the GNU C Library, [...]"
"it's built to survive
Unlike other popular kernel software, the Hurd has an [...]"
=> "[...] Unlike other popular operating system software, the Hurd ..."
"it's scalable
The Hurd implementation is aggressively multithreaded so that it
runs efficiently on both single processors and symmetric
multiprocessors. [...]"
=> "[...] is aggressively multithreaded so that it _could_ run
efficiently on both single processors and symmetric multiprocessors,
if the microkernel supports that. [...]"
"it's extensible The Hurd is an attractive platform for learning how
to become a kernel hacker or for implementing new ideas in kernel
technology. [...]"
=> "[...] GNU/Hurd is an attractive platform learning how to become a
operating system or kernel hacker or for implementing new ideas in
kernel technology. [...]"
"it's stable
It is possible to develop and test new Hurd kernel components
without rebooting the machine (not even accidentally). Running your
own kernel components doesn't interfere with other users, and so no
special system privileges are required. The mechanism for kernel
extensions is secure by design: it is impossible to impose your
changes upon other users unless they authorize them or you are the
system administrator."
=> "[...] It is possible to develop and test new operating system
components without rebooting the machine (not even
accidentally). Running your own components doesn't interfere with
other users, and so no special system privileges are required. The
mechanism for operating system extensions is secure by design:
[...]"
moritz
--
address@hidden - http://duesseldorf.ccc.de/~moritz/
GPG fingerprint = 3A14 3923 15BE FD57 FC06 B501 0841 2D7B 6F98 4199
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- Minor things,
Moritz Schulte <=