• Thread Author
NTDEV’s ecosystem of third‑party builders has a new, headline‑grabbing member: nano11, a PowerShell‑driven script that pushes the tiny‑Windows idea to its limits by producing an ultra‑small Windows 11 image — the developer says an ISO a little over 2 GB and runnable installs in the sub‑3 GB range — at the expense of many standard features and servicing capabilities.

Blue tech infographic showing a ~2 GB Windows ISO with LZ compression and blocked updates.Background​

Windows‑shrink projects have been a visible strand in the Windows enthusiast community for years. They respond to two concurrent realities: Microsoft’s increasingly heavyweight default images, and a segment of users who prefer tight, minimal, deterministic environments for legacy hardware, labs, or specialized appliances. The best‑known example in this space is tiny11, a builder maintained by NTDEV that produces dramatically smaller, debloated Windows 11 ISOs by removing inbox apps and employing stronger image compression. Independent reporting and community documentation show the tiny11 pipeline relies on standard Microsoft tooling (DISM, ADK tools) and recovery‑style compression options to produce multi‑gigabyte savings.
What NTDEV calls nano11 is positioned as an extreme variant — an experimental script that strips far more than the regular tiny11 profiles and produces even smaller images, ostensibly for testing, experiments, and ultra‑lightweight VMs. The core concept is the same: start with an official Windows 11 image, surgically remove optional packages, drivers, fonts, IME components, and other payloads, then re‑pack with aggressive compression. Where nano11 differs is the aggressiveness of removal and the willingness to sacrifice serviceability and features for size and speed.

Overview: what nano11 claims to deliver​

  • An ISO image reduced to “a little over 2 GB” from a stock Windows 11 ISO.
  • An installed footprint reportedly in the ~2.8 GB range when paired with LZX or similar recovery compression techniques — compared with the typical 20 GB+ footprint of a vanilla Windows 11 installation.
  • Compatibility with any Windows 11 edition as a build input (the script operates on official Microsoft images).
  • Extremely fast installs and suitability for tests, throwaway VMs, or hardware experiments rather than daily use.
Those numbers are headline‑worthy, and the broader tiny11 community has produced reproducible examples of multi‑gigabyte shrinkage using the same techniques (LZX/LZMS recovery compression and targeted DISM removals), so the claimed direction and magnitude of savings are plausible. Community write‑ups and reporting document similar reductions with tiny11 variants and explain the compression mechanics in detail.
That said, claims about exact final sizes vary by configuration — what you remove, which edition and language packs you begin with, and which compression flags you use determine outcomes. Any specific “2.0 GB ISO” or “2.8 GB installed” figure should be treated as a representative result from a particular configuration rather than a guaranteed, universal result.

How nano11 (and tiny11) actually shrink Windows images​

The mechanics in plain terms​

  • Image servicing with Microsoft tooling: The scripts mount a Microsoft WIM/ESD image and use DISM and package removal commands to uninstall optional features and inbox UWP packages.
  • Payload reduction: Files and DLLs tied to those components — fonts, IMEs (input method editors), themes/wallpapers, optional drivers, and appx packages — are removed or prevented from being added back in OOBE.
  • Component store/WinSxS pruning: More aggressive variants remove or trim the component store to eliminate servicing baggage; this is where serviceability is most affected.
  • Recovery compression: The rebuilt image is compressed with recovery‑style compression modes (LZX/LZMS) which produce much smaller WIM/ESD payloads for distribution.

Why LZX matters​

LZX (Lempel‑Ziv eXtended) and LZMS are compression schemes used by Windows image tooling that provide a higher compression ratio at the cost of heavier CPU usage during compression and potentially a slower expand time during install. They are the same techniques tiny11 uses to make 24H2 images fit into 3–4 GB, and nano11 leverages the same pipeline with more aggressive trimming prior to re‑compression. The result: much smaller distribution images without changing the Windows install engine itself.

What nano11 removes — and what that means​

nano11 intentionally goes beyond “debloat.” Examples reported by community coverage and NTDEV discourse include removing or disabling:
  • Windows Update / servicing components (component store / WinSxS removal or neutralization), making the image largely unserviceable by standard Windows Update.
  • Windows Hello and biometric frameworks.
  • IME components and language packs not designated as essential.
  • Many inbox apps (Copilot, the New Outlook, Teams, OneDrive, Xbox components, Media Player, and other preinstalled UWP/Win32 apps).
  • Default wallpapers, fonts, and optional drivers.
  • Telemetry and optional background services.
The consequence is a very small, fast system that retains the Windows kernel, basic drivers, and a minimal user shell — but sheds almost everything else. This is ideal for a sandbox or lab VM, but not for a mainstream workstation. Community posts emphasize that tiny11 has two modes — “regular” (serviceable) and “core” (extreme/unserviceable) — and nano11 occupies the far end of that spectrum, closer to core mode in spirit and effect.

Serviceability and updateability: the key trade‑off​

The most important technical caveat is serviceability. Removing WinSxS and the servicing stack or disabling Windows Update means you cannot reliably apply cumulative updates or feature patches through Microsoft’s normal processes. That is not a minor inconvenience — it’s a functional and security risk if such an image is used for an internet‑connected daily machine.
Tiny11’s documentation makes this clear in its “core” profile: you gain minimal size and speed at the cost of losing the ability to service the OS in place; the recommended use case is VMs, disposable images, or testing, not production endpoints. nano11 takes this further and, according to the developer and reporting, intentionally removes update paths to minimize size. Treat that as a design choice, not a bug.

Security implications​

  • No automatic security patches: If Windows Update is removed or disabled, known vulnerability fixes won’t arrive through official channels. That elevates the attack surface for any connected machine.
  • Driver and firmware gaps: Stripping drivers to the minimum can break support for specific hardware (Wi‑Fi chips, camera devices, modern GPUs). That may force reliance on unsigned or manually installed drivers if required.
  • Telemetry and diagnostics: While some users view reduced telemetry as a privacy win, those telemetry pipelines also provide Microsoft with signals used in some security features; removing them can remove telemetry‑driven mitigations.
  • Supply chain and integrity: Using community‑built images requires trust in the builder. The images are created from official Microsoft ISOs, but the removal and repack steps are executed by third‑party scripts — verify hashes and review scripts before trusting them in sensitive environments.
Because of these realities, nano11 is best confined to air‑gapped testing, ephemeral VMs, and lab scenarios unless an organization is willing to accept the ongoing manual maintenance burden.

Use cases where nano11 makes sense​

  • Testing and automation: Rapid spin‑up of stripped Windows VMs for CI, malware testing, or product validation where install size and speed matter above upgrades.
  • Legacy hardware experiments: Short‑term resurrection of devices purely for offline tasks or demonstrations.
  • Education and demonstrations: Teaching Windows internals, image servicing, or compression techniques in constrained environments.
  • Forensic, disaster recovery, or kiosk images: Where a small, deterministic image is necessary and the system will not be updated via Microsoft Update.
It is explicitly not recommended as a daily‑driver for general users or as a primary OS on networked production endpoints. Community commentary and the builder’s own notes position these projects as experimental and specialized tools.

Legal and licensing considerations​

  • The starting point for all these projects is an official Microsoft ISO, which is redistributed in altered form. That raises a licensing and EULA conversation: the Windows license governs how the installed instance can be used; removing bundles or apps does not change the underlying license. Using modified images may affect eligibility for certain support options.
  • These projects do not grant or change activation rights; users must still use valid Windows licenses per Microsoft’s terms.
  • There is a broader, nuanced legal question about redistribution of modified ISOs — community builders typically avoid shipping full ISOs and instead provide scripts that operate on user‑downloaded official media. That approach reduces redistribution risk but does not absolve users of the need to comply with Microsoft’s license for installed instances.
Because the legal landscape depends on jurisdiction and the exact distribution model, organizations should consult legal counsel before deploying modified ISOs in production.

How to build and experiment safely (high‑level steps)​

  • Prepare a disposable environment: use a virtual machine or an isolated test device, never your main workstation.
  • Download an official Windows 11 ISO from Microsoft and verify checksums.
  • Obtain the nano11 (or tiny11) builder scripts from the project’s repository and review the code — verify what is being removed before running anything.
  • Run the builder against the mounted ISO per the project instructions; choose the less extreme “regular” profile if you want to preserve update paths.
  • Test the result offline first: verify functionality for the specific apps and drivers you need.
  • Keep the original ISO and a copy of the builder scripts; you may need to re‑build when new feature updates ship.
These steps mirror the guidance provided by the tiny11 community and help reduce the risk of accidental data loss or an irrecoverable configuration. The community strongly recommends backups and using VMs for experimentation.

Practical performance and compatibility notes​

  • Install time: Lighter images and smaller ISOs typically install faster; community reports note significantly reduced install durations compared with full Windows 11.
  • Memory footprint: Removing background services and many inbox UWP components reduces runtime memory usage, making Windows headless or “safe‑mode like” configurations possible on very low‑spec machines — though GUI and multimedia performance will be compromised.
  • Application compatibility: Many modern apps rely on optional components (media frameworks, specific runtime libraries). Those dependencies can be missing in nano11 and require manual reinstalls or re‑enabling of components.
  • Driver issues: If you rely on non‑standard hardware (Wi‑Fi, fingerprint readers, advanced power management), expect manual driver work and possible lack of support.
Community experiments have demonstrated extreme memory and size reductions, including experimental builds that run in hundreds of MB of RAM for highly constrained environments; these are proof‑of‑concepts rather than practical daily setups.

Verifiable claims and what remains uncertain​

  • Verified and repeatable: Aggressive removal + recovery compression yields multi‑gigabyte ISO reduction; multiple community write‑ups and the tiny11 builder’s documentation corroborate this technique and its results in the 3–4 GB range for some configurations.
  • Developer claim: nano11’s specific “~2 GB ISO” and “~2.8 GB installed” figures are reported by community outlets summarizing the developer’s announcement. These numbers appear plausible based on the same pipeline applied more aggressively, but exact results depend on configuration, languages, and which components are stripped. Treat the exact numbers as a demonstrable case by the author, not an immutable guarantee across editions and builds.
  • Confirmed risk: Removing the servicing stack or WinSxS makes images unserviceable in place; that’s a documented distinction between “regular” and “core” modes in tiny11‑style builders and is a core reason why these images are not recommended for production systems.
If you need absolute repeatability for a given hardware profile and language set, you must build the image yourself and measure the result on your target machine.

Recommendations for Windows enthusiasts and IT administrators​

  • Use nano11 only for the right job: testing, disposable image labs, or constrained single‑purpose devices that won’t be patched via Microsoft Update.
  • Prefer the regular tiny11 pipeline if you want smaller images but still need servicing and updateability.
  • Always test offline. Confirm driver, network, and application compatibility before committing to any deployment.
  • Keep a recovery plan: full backups, recovery media created from an official ISO, and a documented rebuild process.
  • If you need long‑term stability or enterprise compliance, avoid unserviceable core images for production endpoints.

Final analysis — strengths and real risks​

nano11 and the broader tiny11 ecosystem demonstrate a sharp, useful skillset: they show how standard Microsoft tooling can create deterministic, compact Windows images tailored to a narrow purpose. That is a technical strength and a legitimate value proposition for labs, education, or hardware resurrection projects. The use of LZX/LZMS recovery compression plus surgical DISM removals is clever, efficient, and repeatable.
But the strategy involves trade‑offs that get progressively more severe the smaller you go. Removing the servicing stack or Windows Update turns the OS into a static artifact: small and fast, but increasingly brittle and insecure if networked. For most users and organizations, the long‑term maintenance burden outweighs the short‑term gains. Those who do adopt these images must accept active, ongoing manual maintenance, or else run them offline and ephemeral.
In short: nano11 is a powerful experimental tool, not a mainstream migration path. For enthusiasts and researchers it opens interesting possibilities; for production or security‑sensitive environments, it introduces clear hazards.

Closing thought​

Community projects like tiny11 and nano11 are a reminder that desktop operating systems remain malleable artifacts — and that size and functionality are choices. They expose the plumbing of Windows image servicing and compression, and they let the curious test alternate tradeoffs between footprint, features, and maintainability. Those tradeoffs are real and sometimes useful, but they are not free. When adopting an extreme image, the discipline of testing, backups, and isolating the image from production networks becomes the responsibility of the user.

Source: Neowin This script shrinks Windows 11 install down to less than 3GB of disk space
 

NTDEV’s latest build tools push Windows‑shrinking projects into new territory: a purpose‑built “nano11” pipeline that trims a Windows 11 ISO to the absolute minimum, producing ISOs and installed footprints measured in single‑digit gigabytes — and, in developer demos, as small as a 2.29 GB ISO and a 2.8 GB installed system when using LTSC as the source. This is not a gentler debloat — it is an extreme, experimental testbed that deliberately sacrifices serviceability and default features in exchange for the smallest possible distribution and fastest deploy times. (github.com)

Futuristic lab scene with a glowing Windows 11 ISO hologram and a spiraling neon conduit.Background and overview​

For several years a vibrant community of Windows enthusiasts has produced “trimmed” Windows ISOs that remove inbox apps and optional components to shrink disk and memory footprints. NTDEV — the developer behind Tiny11 and related projects — recently consolidated and expanded that work into a PowerShell‑driven ISO builder that offers two distinct directions: a serviceable Tiny11 profile and a much more aggressive “Core / nano11” variant intended as a rapid development or VM testbed. The rewritten pipeline leans on Microsoft’s own tools (DISM, the Windows ADK’s oscdimg.exe) and the stronger recovery‑style compression options DISM exposes. (github.com) (techspot.com)
The headline numbers driving interest are simple and headline‑friendly: ISOs that can be multiple times smaller than stock and installed images that, in demonstrable runs, shrink to the low single‑gigabyte range. NTDEV’s public demonstrations show an example where a standard Windows 11 ISO (7.04 GB in the source clip) was reduced to approximately 2.29 GB after the script processed it, and an LTSC source produced an installed footprint as low as ~2.8 GB in a VM demo. Those figures are achievable only when aggressive component removal is combined with advanced compression and follow‑up Compacting. Treat them as representative outcomes for specific inputs and workflows rather than guaranteed results for every edition, language/locale, or hardware target. (github.com) (tomshardware.com)

What Nano11 actually is (and what it isn’t)​

Nano11 in plain terms​

  • Nano11 is the community name for the extreme, experimental path of the Tiny11 ecosystem: a scripted builder that removes a wide set of optional Windows components, recreates the image, and applies high‑ratio compression to create a minimal, bootable ISO.
  • It focuses on absolute minimalism: removing inbox UWP apps, Copilot, the new Outlook client, consumer Teams, IMEs, fonts, wallpapers, optional drivers, and other components that increase the default payload. It also supports a “Core” profile that strips WinSxS and other servicing infrastructure. (github.com)

What Nano11 is not​

  • It is not a supported Microsoft distribution or a drop‑in replacement for standard retail or enterprise Windows builds.
  • It is not intended for production desktops that must remain updatable via Windows Update or require long‑term vendor support.
  • It is not a magical way to keep security patching intact; the more aggressive the pruning (Core mode), the more you lose the platform’s servicing and update paths.

How the shrinkage works — technical underpinnings​

Understanding why tiny/nano images are possible requires three linked facts: targeted removal, image servicing, and heavy compression.

1) Offline servicing with DISM and PowerShell​

The pipeline mounts an official Microsoft image (WIM/ESD), then uses DISM and scripted removals to uninstall or prevent the inclusion of optional packages and inbox apps. The script can:
  • Remove UWP packages and inbox Win32 apps.
  • Remove IME and language packs, fonts, wallpapers, and optional driver packages.
  • Disable or remove certain background services and scheduled tasks tied to telemetry or cloud features.

2) Compression strategy: /Compress:recovery, LZX/LZMS and CompactOS​

The builder switches DISM’s export/compress mode to the recovery‑style compression (the LZMS/LZX algorithms) to create solid compressed images that are much smaller on disk than standard XPRESS/Fast compression. Recovery compression trades CPU time and memory during the export for substantially lower distribution sizes, which is the core lever that lets a rebuilt ISO fall from many gigabytes to the 2–4 GB band. After installation, the OS can be further compressed using the CompactOS/Compact command with the LZX algorithm to reduce the live on‑disk footprint. These techniques have been independently validated by multiple imaging guides and by the Tiny11 developer’s notes. (techspot.com) (tomshardware.com)

3) Post‑install tweaks that matter​

In NTDEV’s demo workflow the final installed footprint was reduced not solely by the offline removals but also by applying CompactOS (LZX) and deleting the pagefile (and other nonessential large files) after a first boot. The workflow in the demo produced about 11 GB used on a 20 GB VM disk initially, which was then reduced to roughly ~3.2 GB after Compacting and pagefile removal; starting with an LTSC source image and a more minimal selection yielded the 2.8 GB installed example. These additional steps are important: the lowest reported numbers require post‑install compression and manual cleanup. (tomshardware.com)

Demonstration and real numbers — what we can verify​

Several concrete, reproducible facts are testable from the public build notes and the developer’s demonstrations:
  • NTDEV’s rewrite of Tiny11 to a PowerShell pipeline and the addition of a Core/nano profile are documented on the project’s GitHub and in release notes. The repository explicitly calls out use of DISM /Compress:recovery and the Core mode’s lack of serviceability. (github.com)
  • Independent press coverage corroborates the compression mechanics and the claimed scale of savings: earlier Tiny11 Core demos reached installed sizes around 3.3–3.5 GB using LZX, and NTDEV has previously demonstrated even more extreme experiments (text‑only builds) with sub‑2 GB on‑disk footprints. These examples show the pipeline’s technical feasibility; exact results vary by edition and language. (tomshardware.com) (tomshardware.com)
  • The specific demo clip widely circulated shows a 7.04 GB retail ISO reduced to a 2.29 GB ISO by the Nano11 processing pipeline, and an LTSC‑sourced build that ultimately showed an installed footprint as small as ~2.8 GB after Compacting — but these numbers are tied to the selected source ISO, removal profile, and follow‑up Compact/cleanup steps. They are case‑specific demonstrations, not guaranteed universal outcomes. Treat them as a validated case study, not a promise for all builds. (tomshardware.com)

Use cases where Nano11 excels​

Nano11’s approach is purpose‑driven. When applied to the right scenarios, the payoff is genuine:
  • Disposable test VMs and CI runners: ultra‑fast imaging and tiny storage needs make it easy to spin up throwaway VMs for automated tests or ephemeral sandboxing.
  • Lab and driver validation: deterministic, minimal images reduce background noise and let QA teams focus on driver or application behavior without inbox app interference.
  • Kiosks and single‑purpose appliances: devices that must boot fast and take minimal storage can benefit from a trimmed image that excludes irrelevant subsystems.
  • Education, demos, and archival images: small ISOs are easier to copy, distribute, and archive in resource‑constrained contexts.

Clear and present risks — what you give up​

Every gain here has a counterweight. The more extreme the trimming, the greater the operational and security consequences.
  • Serviceability and updates: stripping WinSxS or key servicing components breaks standard Windows Update and feature servicing. You cannot reliably apply cumulative updates or add features post‑install; many Core images are intentionally non‑serviceable. That makes Core/nano images unsuitable for endpoints that must receive regular security updates.
  • Security exposure: disabling or removing Defender components, telemetry safeguards, or update paths increases the long‑term security risk for internet‑facing systems. A trimmed image that never receives patches ages insecurely.
  • Compatibility and drivers: removing optional drivers and components can break hardware on a range of devices. Uncommon Wi‑Fi radios, fingerprint readers, GPU features, or power‑management components may simply be missing — or fail silently — and require manual re‑enabling or driver installs.
  • App and feature breakage: removing Copilot, Outlook, Teams, or related frameworks will break integrations expected by some productivity apps. Even the Settings UI or Search can surface errors if expected components are absent.
  • Vendor support and compliance: modified Microsoft images are not supported by Microsoft; enterprise support agreements may be voided or complicated by custom, unserviceable images. For regulated environments that require vendor‑certified configurations, this is a non‑starter.
Where possible, prefer the “regular” Tiny11 profile that attempts to remain serviceable. Use Nano11/Core only for isolated, offline, or test systems where long‑term patching is not required.

How to experiment safely (high‑level checklist)​

  • Use isolated test hosts or virtual machines — never your daily driver.
  • Download official ISOs from Microsoft and verify checksums before using them as a source.
  • Inspect the builder scripts before running: they are PowerShell scripts that you can audit and modify.
  • Keep a signed, official recovery ISO and a documented rebuild process in case the custom image fails.
  • Measure outcomes: record image sizes, install footprint, and the exact options you used so results are reproducible.
  • If you need updates on trimmed images, prefer the less extreme Tiny11 profile and avoid removing servicing infrastructure. (github.com)

A short, practical high‑level workflow (what the script does)​

  • Mount the official Windows 11 ISO and extract the WIM/ESD image index you want to modify.
  • Mount the image offline with DISM and perform scripted removals (UWP packages, optional drivers, IMEs, fonts, wallpapers).
  • Export/recompress the modified image with DISM using /Compress:recovery (LZMS/LZX) to produce a compact ESD/WIM for the ISO.
  • Recreate the bootable ISO with oscdimg.exe from the Windows ADK and optionally inject an autounattend.xml to automate OOBE choices.
  • After installing in a VM, run CompactOS (LZX) and remove transient artifacts (pagefile, hibernation file) to reach the smallest live footprint. (techspot.com)
Note: the heavy compression options are RAM‑ and CPU‑intensive during image export. Expect longer build times and higher memory requirements compared to standard exports.

How Nano11 compares to Tiny11 and other projects​

  • Tiny11 (regular): aims to be a debloated but serviceable Windows 11. It removes many inbox apps but preserves servicing paths (WinSxS) so updates remain possible. Tiny11 is the safer choice for systems that still need patching.
  • Tiny11 Core / Nano11: trades serviceability for absolute size. It is experimental and intended for VMs, labs, or one‑off appliances. The Core approach removes the component store and other update hooks. (github.com)
  • Other shrinking experiments: community experiments have varied from modest app removals to extreme text‑only builds that reach exceedingly small on‑disk footprints — but those extreme builds lose almost all user‑facing features and are mostly proof‑of‑concept. (tomshardware.com)

Verification and caveats — what we could and couldn’t confirm​

  • The core mechanics — offline DISM servicing, /Compress:recovery export, and CompactOS LZX post‑install compression — are verifiable and reproducible using Microsoft tooling and are documented in NTDEV’s and independent guides. Multiple outlets have described the same pipeline and seen similar magnitudes of savings. (github.com) (techspot.com)
  • The precise numbers reported in a single demo (e.g., 7.04 GB → 2.29 GB ISO, installed 2.8 GB from an LTSC source) are accurate for the presented demo, but these figures depend strongly on the specific source ISO, language packs, and which components were removed. Repeating the same steps on a different SKU or language may yield different results. Treat the demo numbers as a validated case study rather than a universal guarantee. (tomshardware.com)
  • Claims about running trimmed images as long‑term everyday systems or across diverse hardware are not validated; community reporting flags upgrade fragility and hardware‑specific regressions as realistic outcomes. If you require durability and vendor support, these builds are not recommended.

Practical recommendations for IT pros and enthusiasts​

  • For lab automation and CI: Nano11 is a clear win. Small ISOs and quick installs reduce provisioning time and storage overhead.
  • For broader deployments: test extensively. If you need a smaller base image for constrained devices but also expect updates, prefer the serviceable Tiny11 profile. Maintain a documented rebuild process and rebuild images on each feature update.
  • For security‑sensitive systems: don’t deploy Core/nano images to internet‑connected endpoints that require timely security patching.
  • For hobbyists: inspect and modify the repository code. The builder is intentionally script‑first to allow auditability and customization. (github.com)

Final analysis — innovation balanced by real tradeoffs​

The nano11/Core line is a technically impressive demonstration of what careful offline servicing and modern compression can achieve. By combining aggressive package removal with DISM’s recovery compression and CompactOS LZX post‑install compression, NTDEV and the community have shown Windows can be distributed and installed in a dramatically more compact form. For developers, testers, and appliance builders, that matters: it lowers friction, speeds deployment, and enables Windows to run in scenarios that were previously impractical due to storage or bandwidth constraints. (techspot.com)
Yet the gains come with material costs. Removing servicing infrastructure, disabling update paths, or deleting security components increases long‑term maintenance burden and security risk. The projects explicitly describe Core/nano as experimental and lab‑oriented; that label is crucial. For production endpoints, compliance‑sensitive devices, or any environment that requires Microsoft’s update/fix cadence, the standard Tiny11 profile or an official image remains the correct choice.
Nano11 is a powerful tool when used for its intended purpose — a quick, dirty, reproducible development testbed and a means to explore the limits of Windows packaging and compression. It is not a magic solution to make Windows “lighter” without consequences. For anyone considering using it beyond experimentation, the pragmatic path is clear: test in VMs, measure the tradeoffs, keep official recovery images, and plan for rebuilds rather than long‑term patching on pruned islands.

The release is an important reminder that platform engineering and community ingenuity can reshape how we think about OS distribution size and boot times — but that operational tradeoffs matter. Nano11’s engineering is a useful tool for the right jobs; treating the developer’s demos and extreme numbers as tools for planning, not as turnkey production targets, is the pragmatic conclusion. (github.com)

Source: Tom's Hardware Nano11 compresses Windows 11 install footprint to as little as 2.8GB — 'extreme experimental script' is 3.5 times smaller than Tiny11 and comes with 'none of the fluff'
 

Back
Top