Updated BIND removal description
[ikiwiki.git] / index.mdwn
CommitLineData
6e5b2f57 1## Ongoing DragonFly News
0d01a4cf 2
f83c3ef2 3### 2.6.2 Released, 22-Apr-2010!
ab47c073 4
f83c3ef2 5The [[DragonFly 2.6.2 release|release26]] is now available! This release features our
eeea7183 6new swapcache, a tmpfs port, fast-fsync for HAMMER, improved random I/O, and numerous
f83c3ef2 7other goodies. 2.6.2 features a major bug fix to a HAMMER issue related to reblocking
8full filesystems.
7fdbf5f2 9
5775e524 10### Summer of Code participation
ab47c073 11
902dcc2e 12DragonFly is in Google's [Summer of Code](http://socghop.appspot.com/org/home/google/gsoc2009/dragonflybsd) program for a third year! Consult the [Summer of Code 2010](/docs/developer/gsoc2010/) page for a current list of projects and ideas.
ab47c073 13
066f5eec 14<div class="digestbox">
ab47c073 15More news from the <a href="http://www.shiningsilence.com/dbsdlog/">DragonFly Digest</a>
bef9be4c 16<ul>
1590b99f 17<span class="digestcontent">[[!inline pages="internal(digest/*)" feeds="no" template="digestitem"]]</span>
bef9be4c 18</ul>
38589012 19Follow DragonFly news on <a href="http://dragonflybsd.tumblr.com/">Tumblr</a> and <a href="http://www.twitter.com/dragonflybsd">Twitter</a>.
bef9be4c 20</div>
21
6e5b2f57 22## What is DragonFly BSD?
b45421dc 23
24DragonFly belongs to the same class of operating system as BSD and Linux
25and is based on the same UNIX ideals and APIs. DragonFly gives the BSD
26base an opportunity to grow in an entirely different direction from the one
27taken in the FreeBSD, NetBSD, and OpenBSD series.
28
ab47c073 29The DragonFly project's
b45421dc 30ultimate goal is to provide native clustering support in the kernel.
31This involves the creation of a sophisticated cache management
32framework for filesystem namespaces, file spaces, and VM spaces, which
33allows heavily interactive programs to run across multiple machines with
34cache coherency fully guaranteed in all respects. This also involves being
35able to chop up resources, including the cpu by way of a controlled VM
36context, for safe assignment to unsecured third-party clusters over the
37internet (though the security of such clusters itself might be in doubt,
38the first and most important thing is for systems donating resources to not
39be made vulnerable through their donation).
b043b812 40
fe587c8b 41For more information, visit the [[History|History]] page.