Langer satz.

This commit is contained in:
linse 2017-09-17 11:25:21 -04:00
parent 3a1f94bd4c
commit 53ebc3bc75

10
Home
View file

@ -4,7 +4,7 @@ author: someone
--- ---
At robur, we build performant bespoke minimal operating systems for high-assurance services. At robur, we build performant bespoke minimal operating systems for high-assurance services.
With our approach to systems development we provide the following advantages for you: With our approach to systems development we provide the following advantages for you:
* based on the unikernel pioneer [MirageOS](https://mirage.io) * systems based on the unikernel pioneer [MirageOS](https://mirage.io)
* secure implementation guarded against memory corruption, typelevel problems, leaky abstraction and unforseen state * secure implementation guarded against memory corruption, typelevel problems, leaky abstraction and unforseen state
* ready for the cloud, services run on all major hypervisors * ready for the cloud, services run on all major hypervisors
* instant boot * instant boot
@ -14,10 +14,10 @@ With our approach to systems development we provide the following advantages for
* extensive library ecosystem, yet minimal trusted code base at runtime * extensive library ecosystem, yet minimal trusted code base at runtime
* rapid prototyping with a seamless path from prototype to production * rapid prototyping with a seamless path from prototype to production
Computers on the Internet get compromised, either to steal data from databases Computers on the Internet get compromised mostly to gain or block access to data.
on the computer or deploy ransomware which blocks access to the data until a fee User data is being downloaded, leaked and sold, or ransomware blocks access to user data until a fee
is paid, or to use the computing resources by participating in denial of service is paid. Other common attacks target compute resources, to use them in denial of service
attacks or manipulate opinion using chatbots. attacks or to manipulate opinion with chatbots.
The software stack often includes code which is no longer needed, such as floppy The software stack often includes code which is no longer needed, such as floppy
disk drivers which is around at runtime, which is an unneccessary attack disk drivers which is around at runtime, which is an unneccessary attack