Update lead text

The text fully-virtualized may be taken to mean virtualized hardware, so drop that.
This commit is contained in:
Adin Scannell 2019-04-03 00:14:55 -07:00 committed by Ian Lewis
parent 5f7f96b50b
commit 6eb84a20ba
1 changed files with 1 additions and 1 deletions

View File

@ -13,7 +13,7 @@ description = "A container sandbox runtime focused on security, efficiency, and
{{< /blocks/cover >}}
{{% blocks/lead color="secondary" %}}
gVisor is an open-source, <a href="https://www.opencontainers.org/" target="_blank" rel="noopener">OCI-compatible</a> sandbox runtime that provides a fully-virtualized container environment. It runs containers with a new <a href="https://en.wikipedia.org/wiki/User_space" target="_blank" rel="noopener">user-space</a> kernel, delivering a low overhead container security solution for low I/O, highly scaled applications.
gVisor is an open-source, <a href="https://www.opencontainers.org/" target="_blank" rel="noopener">OCI-compatible</a> sandbox runtime that provides a virtualized container environment. It runs containers with a new <a href="https://en.wikipedia.org/wiki/User_space" target="_blank" rel="noopener">user-space</a> kernel, delivering a low overhead container security solution for high-density applications.
gVisor integrates with <a href="https://www.docker.com/" target="_blank" rel="noopener">Docker</a>, <a href="https://containerd.io/" target="_blank" rel="noopener">containerd</a> and <a href="https://kubernetes.io/" target="_blank" rel="noopener">Kubernetes</a>, making it easier to improve the security isolation of your containers while still using familiar tooling. Additionally, gVisor supports a variety of underlying mechanisms for intercepting application calls, allowing it to run in diverse host environments, including cloud-hosted virtual machines.
{{% /blocks/lead %}}