2.6.3 note
[ikiwiki.git] / index.mdwn
CommitLineData
6e5b2f57 1## Ongoing DragonFly News
0d01a4cf 2
1534ec71 3### 2.6.3 Released, 05-May-2010!
ab47c073 4
1534ec71 5The [[DragonFly 2.6.3 release|release26]] is now available! This release features our
eeea7183 6new swapcache, a tmpfs port, fast-fsync for HAMMER, improved random I/O, and numerous
1534ec71 7other goodies. 2.6.3 updates the extattr ABI, which is needed for some third-party software to build.
7fdbf5f2 8
5775e524 9### Summer of Code participation
ab47c073 10
902dcc2e 11DragonFly is in Google's [Summer of Code](http://socghop.appspot.com/org/home/google/gsoc2009/dragonflybsd) program for a third year! Consult the [Summer of Code 2010](/docs/developer/gsoc2010/) page for a current list of projects and ideas.
ab47c073 12
066f5eec 13<div class="digestbox">
ab47c073 14More news from the <a href="http://www.shiningsilence.com/dbsdlog/">DragonFly Digest</a>
bef9be4c 15<ul>
1590b99f 16<span class="digestcontent">[[!inline pages="internal(digest/*)" feeds="no" template="digestitem"]]</span>
bef9be4c 17</ul>
38589012 18Follow DragonFly news on <a href="http://dragonflybsd.tumblr.com/">Tumblr</a> and <a href="http://www.twitter.com/dragonflybsd">Twitter</a>.
bef9be4c 19</div>
20
6e5b2f57 21## What is DragonFly BSD?
b45421dc 22
23DragonFly belongs to the same class of operating system as BSD and Linux
24and is based on the same UNIX ideals and APIs. DragonFly gives the BSD
25base an opportunity to grow in an entirely different direction from the one
26taken in the FreeBSD, NetBSD, and OpenBSD series.
27
ab47c073 28The DragonFly project's
b45421dc 29ultimate goal is to provide native clustering support in the kernel.
30This involves the creation of a sophisticated cache management
31framework for filesystem namespaces, file spaces, and VM spaces, which
32allows heavily interactive programs to run across multiple machines with
33cache coherency fully guaranteed in all respects. This also involves being
34able to chop up resources, including the cpu by way of a controlled VM
35context, for safe assignment to unsecured third-party clusters over the
36internet (though the security of such clusters itself might be in doubt,
37the first and most important thing is for systems donating resources to not
38be made vulnerable through their donation).
b043b812 39
fe587c8b 40For more information, visit the [[History|History]] page.