Language Selection

English French German Italian Portuguese Spanish

rPath™ Reaches One Million Appliance Downloads

Filed under
News

Led by sites like VMware Virtual Appliance Marketplace,
more than 50% of downloads are virtual appliances

Raleigh, NC (July 31, 2007) – rPath™, provider of the first platform for creating and maintaining software and virtual appliances, today announced its one millionth software appliance download. Sources of the one million downloads of rPath-based appliances include rBuilder Online, as well as partner sites such as VMware’s Virtual Appliance Marketplace (VAM). Reflecting the explosive growth in virtualization use, over 50% of the downloads were in virtual appliance format.

Software appliances represent an opportunity for ISVs to streamline and simplify software distribution and management. With an appliance, software vendors can ship thoroughly tested, standard configurations that require minimal installation effort, making them more accessible to potential buyers. Simple software is easier to sell, enabling the ISV to enter markets and open channels of distribution that were previously unavailable to them.

“Our momentum over the past year reflects both the value of the software appliance model and the technical superiority of the rPath solution,” stated Billy Marshall, CEO of rPath. “rPath provides a platform and process that enables application companies to expand into new markets, open new channels of distribution and reduce their development costs.”

About rPath
rBuilder and rPath Appliance Platform transform applications into software appliances. Software appliances simplify server applications by eliminating the hassles of installation, configuration, and maintenance. Independent Software Vendors (ISVs) can expand their markets and simultaneously reduce development and support costs by adopting the software appliance approach. rPath is also the first and only company to automate support for all the major virtualization formats. The company is headquartered in Raleigh, North Carolina. For more information, visit http://www.rpath.com.

Media Relation Contact:
Jill Dykes
Crossroads Public Relations
919.749.8488
jdykes@crossroadspr.com

More in Tux Machines

Leftovers: Software

  • systemd 233 about to be released, please help testing
    systemd 233 is scheduled to be released next week, and there is only a handful of small issues left. As usual there are tons of improvements and fixes, but the most intrusive one probably is another attempt to move from legacy cgroup v1 to a “hybrid” setup where the new unified (cgroup v2) hierarchy is mounted at /sys/fs/cgroup/unified/ and the legacy one stays at /sys/fs/cgroup/ as usual. This should provide an easier path for software like Docker or LXC to migrate to the unified hiearchy, but even that hybrid mode broke some bits.
  • Keep : A personal shell command keeper
    Introducing a new command line tool which solves the issue of memorizing commands or storing them somewhere which is difficult to find. With the grep and run commands, one can easily find their long forgotten commands and use them them right away.
  • qutebrowser v0.10.0 released
    I'm happy to annouce the release of qutebrowser v0.10.0! qutebrowser is a keyboard driven browser with a vim-like, minimalistic interface. It's written using PyQt and cross-platform. I haven't announced the v0.9.0 release in this blog (or any patch releases), but for v0.10.0 it definitely makes sense to do so, as it's mostly centered on QtWebEngine!
  • GNOME Pomodoro: A Pomodoro Timer With AppIndicator And GNOME Shell Support
    GNOME Pomodoro is, like the name suggests, a Pomodoro timer for GNOME. The application website mentions that it's currently only for GNOME Shell, however, an AppIndicator is also available.
  • 7 Awesome Open Source Build Automation Tools For Sysadmin/DevOps/Developers
    Build automation is a vital tool for devops, sysadmins, and developers. It is nothing but scripting or automating the process of compiling source code into binary. Sysadmins can use build tools to manage and update config files. Following is a list of awesome open source and popular tools associated with automating build processes on Linux or Unix-like system.

Android Leftovers

Security Leftovers

  • Major Cloudflare bug leaked sensitive data from customers’ websites
    Cloudflare revealed a serious bug in its software today that caused sensitive data like passwords, cookies, authentication tokens to spill in plaintext from its customers’ websites. The announcement is a major blow for the content delivery network, which offers enhanced security and performance for more than 5 million websites. This could have allowed anyone who noticed the error to collect a variety of very personal information that is typically encrypted or obscured.
  • SHA1 collisions make Git vulnerable to attakcs by third-parties, not just repo maintainers
    After sitting through an endless flood of headless-chicken messages on multiple media about SHA-1 being fatally broken, I thought I'd do a quick writeup about what this actually means.
  • Torvalds patches git to mitigate against SHA-1 attacks
    Linux creator Linus Torvalds says two sets of patches have been posted for the distributed version control system git to mitigate against SHA-1 attacks which are based on the method that Dutch and Google engineers detailed last week. The post by Torvalds detailing this came after reports emerged of the version control system used by the WebKit browser engine repository becoming corrupted after the two proof-of-concept PDF files that were released by the Dutch and Google researchers were uploaded to the repository.
  • Linus Torvalds on "SHA1 collisions found"
  • More from Torvalds on SHA1 collisions
    I thought I'd write an update on git and SHA1, since the SHA1 collision attack was so prominently in the news. Quick overview first, with more in-depth explanation below: (1) First off - the sky isn't falling. There's a big difference between using a cryptographic hash for things like security signing, and using one for generating a "content identifier" for a content-addressable system like git. (2) Secondly, the nature of this particular SHA1 attack means that it's actually pretty easy to mitigate against, and there's already been two sets of patches posted for that mitigation. (3) And finally, there's actually a reasonably straightforward transition to some other hash that won't break the world - or even old git repositories.
  • [Older] Wire’s independent security review
    Ever since Wire launched end-to-end encryption and open sourced its apps one question has consistently popped up: “Is there an independent security review available?” Well, there is now!
  • Malware Lets a Drone Steal Data by Watching a Computer’s Blinking LED
  • FCC to halt rule that protects your private data from security breaches
    The Federal Communications Commission plans to halt implementation of a privacy rule that requires ISPs to protect the security of its customers' personal information. The data security rule is part of a broader privacy rulemaking implemented under former Chairman Tom Wheeler but opposed by the FCC's new Republican majority. The privacy order's data security obligations are scheduled to take effect on March 2, but Chairman Ajit Pai wants to prevent that from happening. The data security rule requires ISPs and phone companies to take "reasonable" steps to protect customers' information—such as Social Security numbers, financial and health information, and Web browsing data—from theft and data breaches. "Chairman Pai is seeking to act on a request to stay this rule before it takes effect on March 2," an FCC spokesperson said in a statement to Ars.
  • Google releases details of another Windows bug
  • How to secure the IoT in your organisation: advice and best practice for securing the Internet of Things
    All of the major technology vendors are making a play in the Internet of Things space and there are few organisations that won’t benefit from collecting and analysing the vast array of new data that will be made available. But the recent Mirai botnet is just one example of the tremendous vulnerabilities that exist with unsecured access points. What are the main security considerations and best practices, then, for businesses seeking to leverage the potential of IoT?

GNOME News

  • FEDORA and GNOME at UNSAAC
    Today I did a talk to introduce students of UNSAAC to the Fedora and GNOME world as it was announced by the GDG Cusco group. We started at 8:30 am and it was a free event:
  • GNOME Theme For Firefox Gets Updated, Looking Great
    There are a lot of complete themes for Firefox. We spoke about 3 of them in one of our previous articles. The good news today is that “GNOME 3” theme (which was also called Adwaita) for Firefox was updated. Now it’s working with all versions higher than Firefox 45. Previously, the theme didn’t work with the recent versions of Firefox. So people had to switch to other available themes. Fortunately, this finally changed today when another developer took the code, fixed the compatibility problems and re-released the theme.
  • GStreamer Now Supports Multi-Threaded Scaling/Conversion For Big Performance Win
    With the addition of over two thousand lines of code, GStreamer's video-convert code within gst-plugins-base is now properly multi-threaded. Video scaling and conversion can now be multi-threaded when using GStreamer. With this multi-threading work by Sebastian Dröge, he commented with the commit, "During tests, this gave up to 1.8x speedup with 2 threads and up to 3.2x speedup with 4 threads when converting e.g. 1080p to 4k in v210."