Feeds

Fedora 16 goes final with cloud and virtualization

Last build before Beefy Miracle

Beginner's guide to SSL certificates

Fedora has released the final build of Fedora 16, and is touting big improvements in the way the OS handles cloud computing and virtualization.

Fedora 16, previously codenamed Verne, is sticking with the wildly unpopular Gnome 3.2 interface, but is giving users the choice between that and KDE 4.7. Incidentally, the wallpaper looks like a representation of Jules Verne’s classic “20,000 Leagues Under The Sea” – which makes El Reg wonder what Fedora 17, aka “Beefy Miracle” will look like.

But it’s the cloud computing and virtualization features upon which Red Hat is selling (so to speak) the system.

On the cloud front, the new OS comes with the Aeolus Infrastructure-as-a-Service (IaaS) system, which allows cross platform control of cloud environments – controlled via a web portal, as well as the OpenStack IaaS platform. For the more security-conscious user, the Fedora build also has HekaFS, a cloud-ready version of GlusterFS that supports encryption and strong authentication protocols.

On the virtualization side, a Fedora Virt-manager guest inspection tool has been added, which gives read-only access to guest file systems, applications, and registry. Virtual networking for larger rollouts has also been beefed up, and virtual discs can be locked down for better security. The Simple Protocol for Independent Computing Environments (SPICE) system has also seen improvements, allowing sharing and two-way audio messaging for virtual desktops.

A new version of Perl, 5.14, is built-in, as is the first version of the programming language D. Python 2 and 3 users can get more control of the GNU Compiler Collection without needing to mess around in C code.

According to the Fedora team, the next beefy build should be out around May 2012, in keeping with the six-month refresh cycled the group has set for itself. ®

Beginner's guide to SSL certificates

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.