Fix up formatting
[ikiwiki.git] / index.mdwn
6e5b2f57 1## Ongoing DragonFly News
0d01a4cf 2
e5279dd1 3### 2.6.3 Released, 07-May-2010!
ab47c073 4
e5279dd1 5The [[DragonFly 2.6.3 release|release26]] is now available! This release features our
eeea7183 6new swapcache, a tmpfs port, fast-fsync for HAMMER, improved random I/O, and numerous
f83c3ef2 7other goodies. 2.6.2 features a major bug fix to a HAMMER issue related to reblocking
e5279dd1 8full filesystems, and 2.6.3 is a stabilization pass which primarily fixes a kernel panic
9related to sendfile() and works around a few pkgsrc issues.
7fdbf5f2 10
5775e524 11### Summer of Code participation
ab47c073 12
902dcc2e 13DragonFly is in Google's [Summer of Code]( program for a third year! Consult the [Summer of Code 2010](/docs/developer/gsoc2010/) page for a current list of projects and ideas.
ab47c073 14
066f5eec 15<div class="digestbox">
ab47c073 16More news from the <a href="">DragonFly Digest</a>
bef9be4c 17<ul>
500cdb5e 18<span class="digestcontent"><!-- inline statement goes here; see HowToEditThisSite for details.</span>
bef9be4c 19</ul>
bf64b941 20Follow DragonFly Digest news on <a href="">Tumblr</a> and <a href="">Twitter</a>.
bef9be4c 21</div>
6e5b2f57 23## What is DragonFly BSD?
b45421dc 24
25DragonFly belongs to the same class of operating system as BSD and Linux
26and is based on the same UNIX ideals and APIs. DragonFly gives the BSD
27base an opportunity to grow in an entirely different direction from the one
28taken in the FreeBSD, NetBSD, and OpenBSD series.
ab47c073 30The DragonFly project's
b45421dc 31ultimate goal is to provide native clustering support in the kernel.
32This involves the creation of a sophisticated cache management
33framework for filesystem namespaces, file spaces, and VM spaces, which
34allows heavily interactive programs to run across multiple machines with
35cache coherency fully guaranteed in all respects. This also involves being
36able to chop up resources, including the cpu by way of a controlled VM
37context, for safe assignment to unsecured third-party clusters over the
38internet (though the security of such clusters itself might be in doubt,
39the first and most important thing is for systems donating resources to not
40be made vulnerable through their donation).
b043b812 41
fe587c8b 42For more information, visit the [[History|History]] page.