Language Selection

English French German Italian Portuguese Spanish

Oracle Buys Ksplice

Oracle today announced that it has acquired Ksplice, Inc., the creator of innovative zero downtime update technology for Linux. The transaction has closed.

The addition of Ksplice's technology will increase the security,reliability and availability of Oracle Linux by enabling customers to apply security updates, diagnostics patches and critical bug fixes without rebooting.

Oracle believes it will be the only enterprise Linux provider that can offer zero downtime updates, and expects to make the Ksplice technology a standard feature of Oracle Linux Premier Support.

rest here




Oh crap

It looks like Oracle's first order of business is to cut off ksplice support for all distros except their own. I'd expect that kind of behavior from microsoft, but Oracle is looking more like the class bully all the time. It's clear that they really intend to play hardball here.

Hopefully alternatives will arise.

re: KSplice

But wait, KSplice is GNU, Linux, FLOSS, FOSS, OSS, Source Code, Stallman blessed software. So can't you just breeze thru the source code and add whatever changes you need? Isn't that the battle cry for all Open Source vs Proprietary software? Who cares what Oracle does, it's Open source man, feel that freedom and let your worries float away.

re: ksplice

Up to this point it's GPL'd, but Oracle can shut Linux users and distributions out from now on. It would require someone to fork and maintain it from here on out. I mean if Oracle didn't have something up its sleeve, why buy it? Why not just use it?

The press release said it all, "Oracle believes it will be the only enterprise Linux provider that can offer zero downtime updates."

but that's the point

But that's the point.

Open Source (at least their drooling fan boys) make a HUGE Point of stating that with Open Source, you get the source code, and with propitiatory software - you don't.

They act like just anyone can breeze thru the code and make it sing and dance to whatever song they want it to.

Except in almost ALL cases, you can't. In this case, as you point out, if someone doesn't fork the code and support it, KSplice as a free ride is over. So any business that bought into the "but it's open source, think of the freedom" BS is screwed if they made KSplice a important part of their business model (or IT Infrastructure, etc).

As to the actual impact from the KSplice deal, if downtime of any sort is unacceptable, you should be running clusters anyways - so downtime for updates/patches/etc is just a matter of doing a rolling update throughout the cluster.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security: VPNFilter, Encryption in GNU/Linux, Intel CPU Bug Affecting rr Watchpoints

  • [Crackers] infect 500,000 consumer routers all over the world with malware

    VPNFilter—as the modular, multi-stage malware has been dubbed—works on consumer-grade routers made by Linksys, MikroTik, Netgear, TP-Link, and on network-attached storage devices from QNAP, Cisco researchers said in an advisory. It’s one of the few pieces of Internet-of-things malware that can survive a reboot. Infections in at least 54 countries have been slowly building since at least 2016, and Cisco researchers have been monitoring them for several months. The attacks drastically ramped up during the past three weeks, including two major assaults on devices located in Ukraine. The spike, combined with the advanced capabilities of the malware, prompted Cisco to release Wednesday’s report before the research is completed.

  • Do Not Use sha256crypt / sha512crypt - They're Dangerous

    I'd like to demonstrate why I think using sha256crypt or sha512crypt on current GNU/Linux operating systems is dangerous, and why I think the developers of GLIBC should move to scrypt or Argon2, or at least bcrypt or PBKDF2.

  • Intel CPU Bug Affecting rr Watchpoints
    I investigated an rr bug report and discovered an annoying Intel CPU bug that affects rr replay using data watchpoints. It doesn't seem to be hit very often in practice, which is good because I don't know any way to work around it. It turns out that the bug is probably covered by an existing Intel erratum for Skylake and Kaby Lake (and probably later generations, but I'm not sure), which I even blogged about previously! However, the erratum does not mention watchpoints and the bug I've found definitely depends on data watchpoints being set. I was able to write a stand-alone testcase to characterize the bug. The issue seems to be that if a rep stos (and probably rep movs) instruction writes between 1 and 64 bytes (inclusive), and you have a read or write watchpoint in the range [64, 128) bytes from the start of the writes (i.e., not triggered by the instruction), then one spurious retired conditional branch is (usually) counted. The alignment of the writes does not matter, and it's not related to speculative execution.

In Memoriam: Robin "Roblimo" Miller, a Videographer and Free Software Champion

Videographer Robin Roblimo Miller

Robin "Roblimo" Miller was a clever, friendly, and very amicable individual who everyone I know has plenty of positive things to say about. I had the pleasure of speaking to him for several hours about anything from personal life and professional views. Miller was a very knowledgeable person whose trade as a journalist and video producer I often envied. I have seen him facing his critics in his capacity as a journalist over a decade ago when he arranged a debate about OOXML (on live radio). Miller, to me, will always be remembered as a strong-minded and investigative journalist who "did the right thing" as the cliché goes, irrespective of financial gain -- something which can sometimes be detrimental to one's longterm health. Miller sacrificed many of his later years to a cause worth fighting for. This is what we ought to remember him for. Miller was - and always will be - a FOSS hero.

May everything you fought for be fulfilled, Mr. Miller. I already miss you.

Today in Techrights

Tux Machines Privacy Statement

Summary: Today, May 25th, the European General Data Protection Regulation (GDPR) goes into full effect; we hereby make a statement on privacy AS a matter of strict principle, this site never has and never will accumulate data on visitors (e.g. access logs) for longer than 28 days. The servers are configured to permanently delete all access data after this period of time. No 'offline' copies are being made. Temporary logging is only required in case of DDOS attacks and cracking attempts -- the sole purpose of such access. Additionally, we never have and never will sell any data pertaining to anything. We never received demands for such data from authorities; even if we had, we would openly declare this (publicly, a la Canary) and decline to comply. Privacy is extremely important to us, which is why pages contain little or no cross-site channels (such as Google Analytics, 'interactive' buttons for 'social' media etc.) and won't be adding any. Google may be able to 'see' what pages people visit because of Google Translate (top left of every page), but that is not much worse than one's ISP 'seeing' the same thing. We are aware of this caveat. Shall readers have any further questions on such matters, do not hesitate to contact us.