lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 15 Jan 2013 20:15:27 -0500
From:	Vladislav Bolkhovitin <vst@...b.net>
To:	scst-devel <scst-devel@...ts.sourceforge.net>,
	linux-kernel@...r.kernel.org, linux-rdma@...r.kernel.org
Subject: [ANNOUNCE]: SCST version 2.2.1 released

SCST version 2.2.1 has just been released. This release includes SCST core, target 
drivers iSCSI-SCST (iSCSI), qla2x00t (QLogic Fibre Channel), ib_srpt (InfiniBand 
SRP) and scst_local (local loopback-like access) as well as SCST management 
utility scstadmin.

SCST allows creation of sophisticated storage devices, which provide advanced 
functionality, like replication, thin provisioning, deduplication, high 
availability, automatic backup, etc. Another class of such devices are Virtual 
Tape Libraries (VTL) as well as other disk-based backup solutions. SCST created 
devices not limited by network interface only, but they can use any link 
supporting SCSI-style data exchange, like Fibre Channel or SAS. Majority of modern 
SAN appliances, especially higher end ones, are SCST based. It might well be that 
your favorite storage appliance running SCST in the firmware.

More info about SCST and its modules you can find on: http://scst.sourceforge.net

Thanks to all who made it happen, especially Bart Van Assche, who prepared the 
packages!

Vlad

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ