Skip to content

Commit cdc2625

Browse files
committed
Some about edits
1 parent a83fde4 commit cdc2625

1 file changed

Lines changed: 9 additions & 4 deletions

File tree

pages/info/about.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,13 @@ While there are many container solutions being used commonly in this day and age
1414
4. **Security model:** Unlike many other container systems designed to support trusted users running trusted containers we must support the opposite model of untrusted users running untrusted containers. This changes the security paradigm considerably and increases the breadth of use cases we can support.
1515

1616
## Background
17-
A Unix operating system is broken into two primary components, the kernel space, and the user space. The Kernel, supports the user space by interfacing with the hardware, providing core system features and creating the software compatibility layers for the user space. The user space on the other hand is the environment that most people are most familiar with interfacing with. It is where applications, libraries and system services run.
17+
A Unix operating system is broken into two primary components, the kernel space, and the user space. The Kernel supports the user space by interfacing with the hardware, providing core system features and creating the software compatibility layers for the user space. The user space on the other hand is the environment that most people are most familiar with interfacing with. It is where applications, libraries and system services run.
1818

19-
Containers are shifting the emphasis away from the runtime environment by commoditizing the user space into swappable units. This means that the entire user space portion of a Linux operating system, including programs, custom configurations, and environment can be interchanged at runtime. Singularity emphasis and simplifies the distribution vector of containers to be that of a single, verifiable file.
19+
Containers are shifting the emphasis away from the runtime environment by commoditizing the user space into swappable components. This means that the entire user space portion of a Linux operating system, including programs, custom configurations, and environment can be interchanged at runtime. Singularity emphasis and simplifies the distribution vector of containers to be that of a single, verifiable file.
2020

2121
Software developers can now build their stack onto whatever operating system base fits their needs best, and create distributable runtime encapsulated environments and the users never have to worry about dependencies, requirements, or anything else from the user space.
2222

23-
It provides the functionality of a virtual machine, without the heavyweight implementation and performance costs of emulation and redundancy!
23+
Singularity provides the functionality of a virtual machine, without the heavyweight implementation and performance costs of emulation and redundancy!
2424

2525
### The Singularity Solution
2626
Singularity has two primary roles:
@@ -32,6 +32,7 @@ The Singularity containers themselves are purpose built and can include a simple
3232

3333
```
3434
$ mkdir ~/bin
35+
3536
$ singularity build ~/bin/python-latest docker://python:latest
3637
Docker image path: index.docker.io/library/python:latest
3738
Cache folder set to /home/gmk/.singularity/docker
@@ -50,19 +51,23 @@ WARNING: it may be missing some functionality.
5051
Building Singularity image...
5152
Cleaning up...
5253
Singularity container built: /home/gmk/bin/python-latest
54+
5355
$ which python-latest
5456
/home/gmk/bin/python-latest
57+
5558
$ python-latest --version
5659
Python 3.6.3
60+
5761
$ singularity exec ~/bin/python-latest cat /etc/debian_version
5862
8.9
63+
5964
$ singularity shell ~/bin/python-latest
6065
Singularity: Invoking an interactive shell within container...
6166
6267
Singularity python-latest:~>
6368
```
6469

65-
<font color='red' size='+2'>Ascineimsasasessssss!</font>
70+
<font color='red' size='+1'>Ascineimsasasessssss!</font>
6671

6772
Additionally, Singularity blocks privilege escalation within the container and you are always yourself within a container! If you want to be root inside the container, you first must be root outside the container. This simple usage paradigm mitigates many of the security concerns that exists with containers on multi-user shared resources. You can directly call programs inside the container from outside the container fully incorporating pipes, standard IO, file system access, X11, and MPI. Singularity images can be seamlessly incorporated into your environment.
6873

0 commit comments

Comments
 (0)