aboutsummaryrefslogtreecommitdiff
path: root/en_US.ISO8859-1/htdocs
diff options
context:
space:
mode:
authorBenjamin Kaduk <bjk@FreeBSD.org>2017-08-07 02:26:00 +0000
committerBenjamin Kaduk <bjk@FreeBSD.org>2017-08-07 02:26:00 +0000
commit76d3d1a9b098c4455cffeae0c5cd69967be86785 (patch)
treeeaf2bb861cf8ec0359451e39601e47163721960e /en_US.ISO8859-1/htdocs
parent2d270a76bdee435abe37da465fcd289f13020cec (diff)
downloaddoc-76d3d1a9b098c4455cffeae0c5cd69967be86785.tar.gz
doc-76d3d1a9b098c4455cffeae0c5cd69967be86785.zip
Edits to the 2017Q2 report from linimon
Submitted by: linimon
Notes
Notes: svn path=/head/; revision=50640
Diffstat (limited to 'en_US.ISO8859-1/htdocs')
-rw-r--r--en_US.ISO8859-1/htdocs/news/status/report-2017-04-2017-06.xml53
1 files changed, 26 insertions, 27 deletions
diff --git a/en_US.ISO8859-1/htdocs/news/status/report-2017-04-2017-06.xml b/en_US.ISO8859-1/htdocs/news/status/report-2017-04-2017-06.xml
index ce0e26ffd0..93f8fe08fd 100644
--- a/en_US.ISO8859-1/htdocs/news/status/report-2017-04-2017-06.xml
+++ b/en_US.ISO8859-1/htdocs/news/status/report-2017-04-2017-06.xml
@@ -203,10 +203,10 @@
OVH is using ZFS, an introduction to jails, and a use case for
BGP/bird on &os;.</p>
- <p> The second meetup, also hosted in the OVH office, presented these
+ <p>The second meetup, also hosted in the OVH office, presented these
subjects: how to create a &os; port (presented by jadawin@),
how OVH is using Finite State Machines for managing their
- storage system, network high-availibility with &os;, and a
+ storage system, network high-availability with &os;, and a
jail tutorial by means of a demonstration running 200 OSFP
(using <tt>net/bird</tt>) routers using jail and vnets on a
small PC Engines APU2 system with only 4 CPU cores (1Ghz AMD)
@@ -354,8 +354,8 @@
of &os;, announcing code freezes, and maintaining the
respective branches, among other things.</p>
- <p>The &os;&nbsp;11.1-RELEASE cycle started on May 19, and is
- continuing as scheduled. &os; consumers are urged to test
+ <p>The &os;&nbsp;11.1-RELEASE cycle started on May 19, and
+ continued as scheduled. &os; consumers are urged to test
whenever possible to help ensure the reliability and stability
of the upcoming second release from the <tt>stable/11</tt>
branch.</p>
@@ -388,7 +388,7 @@
<links>
<url href="https://wiki.FreeBSD.org/LLD">&os; <tt>lld</tt> Wiki Page</url>
<url href="http://llvm.org/pr23214">&os;/LLD Tracking PR (LLVM Bugzilla)</url>
- <url href="https://bugs.FreeBSD.org/214864"> Exp-Run Request Using <tt>lld</tt> as <tt>/usr/bin/ld</tt></url>
+ <url href="https://bugs.FreeBSD.org/214864">Exp-Run Request Using <tt>lld</tt> as <tt>/usr/bin/ld</tt></url>
</links>
<body>
@@ -474,7 +474,6 @@
</person>
</contact>
-
<body>
<p>DTS (Device Tree Source) files provide a human-readable
source description of the hardware resources for a given
@@ -687,7 +686,7 @@
usable. This attempt that I call &quot;Plan B&quot;, only
uses &os;, with one &os; server handling the metadata
operations and multiple &os; servers configured to serve
- data, is now ready for third party testing. If testing by
+ data and is now ready for third party testing. If testing by
third parties goes well, I anticipate the code will be
merged into &os; head in time for &os;&nbsp;12. Fairly
recent &os; or Linux systems should be usable as pNFS
@@ -1084,7 +1083,7 @@
<p>The most important changes since the last report are:</p>
<ul>
- <li>Ceph has releassed the release candidate of v12.1.0 (aka
+ <li>Ceph has released release candidate v12.1.0 (aka
Luminous); the corresponding packaging is sitting in my tree
waiting for Luminous to be actually released.</li>
@@ -1164,7 +1163,7 @@
the packages &os; already has in place. There are many
details to work out here.</task>
- <task>Design a vitual disk implementation that can be used with
+ <task>Design a virtual disk implementation that can be used with
<tt>bhyve</tt> and attached to an RBD image.</task>
</help>
</project>
@@ -1417,7 +1416,7 @@
is both a KDE committer and part of our KDE on &os; team, for
spearheading the efforts.</p>
- <p>The following big updates were landed in the ports tree this
+ <p>The following big updates landed in the ports tree this
quarter:</p>
<ul>
@@ -1445,7 +1444,7 @@
<li><tt>py-sip</tt> was updated to 4.19.2, PyQt4 to 4.12 and PyQt5 to
5.7.1</li>
- <li>Several fixes for ARMv6 were landed to the Qt4 and Qt5
+ <li>Several fixes for ARMv6 landed in the Qt4 and Qt5
ports &mdash; thanks to Mikaƫl Urankar</li>
</ul>
@@ -1654,8 +1653,8 @@
<p>Some major version updates are: <tt>pkg</tt> 1.10.1, Firefox
54.0.1, and Chromium 59.0.3071.115.</p>
- <p>Behind the scenes, antoine@ ran 36 exp-runs to test version updates,
- making CRAN ports platform-independent, test installing
+ <p>Behind the scenes, antoine@ ran 36 exp-runs to test version
+ updates, making CRAN ports platform-independent, test installing
bsdgrep(1) as <tt>/usr/bin/grep</tt>, test LLVM updates, test
the ino64 project, and perform Makefile cleanups.</p>
</body>
@@ -1750,7 +1749,7 @@
RAM.</p>
<p>The default linker on arm64 is now <tt>lld</tt>. This
- means &os; is able to built itsself with just the components
+ means &os; is able to build itself with just the components
in the base system, a big milestone!</p>
</body>
</project>
@@ -1781,7 +1780,7 @@
also making slow progress to add support for even more
platforms.</p>
- <p>Discussion has started upstream to support API/ABI breaking
+ <p>Discussion has started upstream to support API/ABI-breaking
changes between major releases of operating systems. For
instance, this is required to be able to target both &os; 11.x
and 12.x, which have ABI changes involving important
@@ -1897,7 +1896,7 @@
Randomization (ASLR) as an initial focal point and is now
implementing further exploit mitigation techniques.</p>
- <p>It has been a long while since HardenedBSD's laste appearance
+ <p>It has been a long while since HardenedBSD's last appearance
in a quarterly status report, with the last status report
being from December of 2015. Accordingly, this status report
will be a long one!</p>
@@ -1941,7 +1940,7 @@
a number of high-profile ports in HardenedBSD's ports
tree.</p>
- <p>In March of 2017, we added Control Flow Integrity (CFI) for
+ <p>In March of 2017, we added Control Flow Integrity (CFI) to
the base system. CFI is an exploit mitigation technique that
helps prevent attackers from modifying the behavior of a
program and jumping to undefined or arbitrary memory
@@ -1970,12 +1969,12 @@
HardenedBSD's PaX SEGVGUARD implementation received a few
updates to make it more stable and performant.</p>
- <p>In March of 2017, HardenedBSD is now accessible through a Tor
- hidden service. The main website, binary updates, and
+ <p>As of March 2017, HardenedBSD is now accessible through a
+ Tor hidden service. The main website, binary updates, and
package distribution are all available over the hidden
service.</p>
- <p>We now maintains our own version of the <tt>drm-next</tt>
+ <p>We now maintain our own version of the <tt>drm-next</tt>
branch for updated graphics support. Binary updates are also
provided for this branch.</p>
@@ -2058,9 +2057,9 @@
well as locally adjusting the default version a lot
easier.</p>
- <p><tt>gcc8-devel</tt> has been added, and armv6hf support removed, and we
- made adjustments for newer versions of &os;. Also of note are
- various cleanups and changes to improve the robustness of our
+ <p><tt>gcc8-devel</tt> has been added, and armv6hf support removed,
+ and we made adjustments for newer versions of &os;. Also of note
+ are various cleanups and changes to improve the robustness of our
packages and the addition of support for aarch64 to many
ports.</p>
@@ -2392,9 +2391,9 @@
Read more at <a
href="https://www.FreeBSDfoundation.org/blog/conference-recap-oscon-2017/">https://www.FreeBSDfoundation.org/blog/conference-recap-oscon-2017/</a>.</p>
- <p>RootConf 2017 (contributed by Philip Paeps)</p>
+ <p>Rootconf 2017 (contributed by Philip Paeps)</p>
- <p>In mid-May I presented at Rootconf 2017 in Bangalore.
+ <p>In mid-May I presented at Rootconf 2017 in Bangalore.
Rootconf is India's principal conference where systems and
operations engineers share real world knowledge about
building reliable systems. <a
@@ -2415,8 +2414,8 @@
without compromising availability. Their spotswap <a
href="https://github.com/mapbox/spotswap/">https://github.com/mapbox/spotswap/</a>
software has been released under a BSD license. It sounds
- like it should be possible to port this to &os; with minimal
- effort. Read more at <a
+ as though it should be possible to port this to &os; with
+ minimal effort. Read more at <a
href="https://www.FreeBSDfoundation.org/blog/rootconf-2017-trip-report-philip-paeps/">https://www.FreeBSDfoundation.org/blog/rootconf-2017-trip-report-philip-paeps/</a>.</p>
<p>BSDCan 2017/&os; Developers Summit (contributed by Deb