LWN: Comments on "Sandstorm personal cloud platform" https://lwn.net/Articles/603485/ This is a special feed containing comments posted to the individual LWN article titled "Sandstorm personal cloud platform". en-us Fri, 05 Sep 2025 16:55:08 +0000 Fri, 05 Sep 2025 16:55:08 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Sandstorm personal cloud platform https://lwn.net/Articles/606007/ https://lwn.net/Articles/606007/ kentonv <p>Update: We've now started a crowdfunding campaign for Sandstorm: <p><a href="http://igg.me/at/sandstorm">http://igg.me/at/sandstorm</a> Sun, 20 Jul 2014 21:57:13 +0000 Sandstorm personal cloud platform https://lwn.net/Articles/605316/ https://lwn.net/Articles/605316/ zenaan <div class="FormattedComment"> An idea I've had for a long years which might fuel potential docker-like projects is application-specific WINE containers.<br> <p> Over the years, some proprietary apps (which some unfortunate sods like me still have to use on occasion) have gone from "good luck with that" to "gold" level compatibility/ runtime support, only to later slip back down to say "bronze".<br> <p> When an environment/ setup/ version of WINE ready for the installation of that app is at "gold" level, then that env ought be containerized, so that it can be deserialized/ unzipped/ copied as needed, ready for consistently installing at "gold" level, that specific proprietary application.<br> </div> Mon, 14 Jul 2014 02:30:09 +0000 Sandstorm personal cloud platform https://lwn.net/Articles/603637/ https://lwn.net/Articles/603637/ smoogen <div class="FormattedComment"> This is a very interesting project with how I would like to have a cloud on my laptop :). <br> </div> Thu, 26 Jun 2014 18:50:17 +0000 Sandstorm personal cloud platform https://lwn.net/Articles/603554/ https://lwn.net/Articles/603554/ kentonv <div class="FormattedComment"> Sandstorm lead dev here. Thanks for the write-up! Happy to answer any questions people have.<br> <p> This design would be totally impossible without modern Linux kernel features like namespacing, cgroups, and seccomp-bpf. Lightweight sandboxing means it's reasonable to sandbox at the granularity of documents and spin-up sandboxes on-demand -- simply not feasible with traditional VMs. Meanwhile, using native-code sandboxes (as opposed to programming-language-specific) means we've been able to port a lot of existing open source apps to quickly bootstrap the ecosystem. In just the last couple weeks we've ported Mailpile, Ghost, ShareLaTeX, Mediawiki, and others. These aren't on the app list yet as we're still polishing a couple things, but will be there soon.<br> <p> Many thanks to the Linux kernel devs for making all this possible!<br> </div> Thu, 26 Jun 2014 03:46:19 +0000