44
I Use This!
Very High Activity

News

Analyzed 1 day ago. based on code collected 3 days ago.
Posted almost 20 years ago
Nix 0.9 has been released. This is a new major release that provides quite a few performance improvements and bug fixes, as well as a number of new features. Read the release notes for details.
Posted almost 20 years ago
Nix 0.9 has been released. This is a new major release that provides quite a few performance improvements and bug fixes, as well as a number of new features. Read the release notes for details.
Posted almost 20 years ago
Nix 0.9 has been released. This is a new major release that provides quite a few performance improvements and bug fixes, as well as a number of new features. Read the release notes for details.
Posted almost 20 years ago
The paper “Secure Sharing Between Untrusted Users in a Transparent Source/Binary Deployment Model” has been accepted at ASE 2005. This paper describes how a Nix store can be securely shared by multiple users who may not ... [More] trust each other; i.e., how do we prevent one user from installing a Trojan horse that is subsequently executed by some other user? [Less]
Posted almost 20 years ago
The paper “Secure Sharing Between Untrusted Users in a Transparent Source/Binary Deployment Model” has been accepted at ASE 2005. This paper describes how a Nix store can be securely shared by multiple users who may not ... [More] trust each other; i.e., how do we prevent one user from installing a Trojan horse that is subsequently executed by some other user? [Less]
Posted almost 20 years ago
The paper “Secure Sharing Between Untrusted Users in a Transparent Source/Binary Deployment Model” has been accepted at ASE 2005. This paper describes how a Nix store can be securely shared by multiple users who may ... [More] not trust each other; i.e., how do we prevent one user from installing a Trojan horse that is subsequently executed by some other user? [Less]
Posted almost 20 years ago
The paper “Secure Sharing Between Untrusted Users in a Transparent Source/Binary Deployment Model” has been accepted at ASE 2005. This paper describes how a Nix store can be securely shared by multiple users who may ... [More] not trust each other; i.e., how do we prevent one user from installing a Trojan horse that is subsequently executed by some other user? [Less]
Posted almost 20 years ago
The paper “Service Configuration Management” (accepted at the 12th International Workshop on Software Configuration Management) describes how we can rather easily deploy “services” (e.g., complete webserver ... [More] configurations such as our Subversion server) through Nix by treating the non-component parts (such as configuration files, control scripts and static data) as components that are built by Nix expressions. The result is that all advantages that Nix offers to software deployment also extend to service deployment, such as the ability to easily have multiple configuration side by side, to roll back configurations, and to identify the precise dependencies of a configuration. [Less]
Posted almost 20 years ago
The paper “Service Configuration Management” (accepted at the 12th International Workshop on Software Configuration Management) describes how we can rather easily deploy “services” (e.g., complete webserver ... [More] configurations such as our Subversion server) through Nix by treating the non-component parts (such as configuration files, control scripts and static data) as components that are built by Nix expressions. The result is that all advantages that Nix offers to software deployment also extend to service deployment, such as the ability to easily have multiple configuration side by side, to roll back configurations, and to identify the precise dependencies of a configuration. [Less]
Posted almost 20 years ago
The paper “Service Configuration Management” (accepted at the 12th International Workshop on Software Configuration Management) describes how we can rather easily deploy “services” (e.g., complete webserver ... [More] configurations such as our Subversion server) through Nix by treating the non-component parts (such as configuration files, control scripts and static data) as components that are built by Nix expressions. The result is that all advantages that Nix offers to software deployment also extend to service deployment, such as the ability to easily have multiple configuration side by side, to roll back configurations, and to identify the precise dependencies of a configuration. [Less]