Library design choices
be thread safe
arrange only the basic, more common primitives
target common cluster computing environments
Exploit basic OS (user/system code interaction)
Exploit TCP/UDP/IP (the whole stack)
support accesses to remote memory
Previous slide
Next slide
Back to first slide
View graphic version