From 42d48574a7575072604aa419ef601a5a7edbca01 Mon Sep 17 00:00:00 2001
From: Morris Jette <jette@schedmd.com>
Date: Wed, 31 Jul 2013 13:26:41 -0700
Subject: [PATCH] Update news web page for new releases to come

---
 doc/html/news.shtml | 94 ++++++++++++++++++++++++++++++---------------
 1 file changed, 64 insertions(+), 30 deletions(-)

diff --git a/doc/html/news.shtml b/doc/html/news.shtml
index 8f8148106e3..5585f0e1ffd 100644
--- a/doc/html/news.shtml
+++ b/doc/html/news.shtml
@@ -5,7 +5,8 @@
 <h2>Index</h2>
 <ul>
 <li><a href="#26">Slurm Version 2.6, June 2013</a></li>
-<li><a href="#1312">Slurm Version 13.12 and beyond</a></li>
+<li><a href="#1312">Slurm Version 13.12, December 2013</a></li>
+<li><a href="#1406">Slurm Version 14.06 and beyond</a></li>
 <li><a href="#security">Security Patches</a></li>
 </ul>
 
@@ -17,7 +18,7 @@ Major enhancements include:
     for sets of similar jobs.</li>
 <li><a href="hdf5_profile_user_guide.html">Job profiling</a> capability added
     to record a wide variety of job characteristics for each task on a user
-    configurable periodic basis. Data currently available inclues CPU use,
+    configurable periodic basis. Data currently available includes CPU use,
     memory use, energy use, Infiniband network use, Lustre file system use,
     etc.</li>
 <li>Support for MPICH2 using PMI2 communications interface with much greater
@@ -40,29 +41,62 @@ Major enhancements include:
     "cpu" could be limited to only a subset of the node's CPUs, insuring that
     one or more CPUs would be available to jobs in the "gpu" partition/queue.</li>
 </ul>
+</p>
 
-<h2><a name="1312">Major Updates in Slurm Version 13.12 and beyond</a></h2>
-<p><b>NOTICE: Starting with 13.12 we will be numbering Slurm versions
- with YEAR.MONTH nomenclature.</b>
+<h2><a name="1312">Major Updates in Slurm Version 13.12</a></h2>
+<p>NOTICE: Starting with 13.12 we will be numbering Slurm versions
+with a YEAR.MONTH format.<br>
+SLURM Version 13.12 release is planned in December 2013.
+Major enhancements include:
+<ul>
+<li>Integration with
+    <a href="http://en.wikipedia.org/wiki/FlexNet_Publisher">FLEXlm (Flexnet Publisher)</a>
+    license management.</li>
+<li>Layouts framework, which will be the basis for further developments toward
+    optimizing scheduling with respect to additional parameters such as temperature
+    and power consumption.</li>
+<li>Energy consumption added as a factor in fair-share scheduling.</li>
+<li>Energy aware scheduling added with respect to power caps.</li>
+<li>Improved user support for fault-tolerance (e.g. "hot spare" resources).</li>
+<li>New partition configuration parameters: AllowAccounts, AllowQOS,
+    DenyAccounts and DenyQOS.</li>
+<li>Scalability improvements for MPI initialization including communication of
+    the compute node network interface details.</li>
+<li>Defer sending SIGKILL signal to processes while a core dump is in progress.</li>
+<li>Other important enhancements that can not be made public at this time...</li>
+</ul>
+</p>
+
+
+<h2><a name="1406">Major Updates in Slurm Version 14.06 and beyond</a></h2>
 <p> Detailed plans for release dates and contents of additional SLURM releases
 have not been finalized. Anyone desiring to perform SLURM development should
 notify <a href="mailto:slurm-dev@schedmd.com">slurm-dev@schedmd.com</a>
 to coordinate activities. Future development plans includes:
 <ul>
-<li>Scheduling optimized for energy efficiency.</li>
-<li>Improved user support for fault-tolerance (e.g. "hot spare" resources).</li>
+<li>Distributed architecture to support the management of resources with Intel
+    MIC processors.</li>
+<li>Support of I/O as a new resources, including proxy I/O nodes with data
+    locality.</li>
+<li>Improved scheduling support for job dependencies (e.g. pre-processing,
+    post-processing, co-processing on I/O nodes, etc.) to optimize overall
+    system utilization.</li>
+<li>IP communications over InfiniBand network for improved performance.</li>
+<li>Support for heterogeneous GPU environments (i.e. user specification of
+    desired GPU types).</li>
+<li>Fault-tolerance and jobs dynamic adaptation through communication protocol
+    between Slurm , MPI libraries and the application.</li>
+<li>Improved support for high-throughput computing (e.g. multiple slurmctld
+    daemons on a single cluster).</li>
+<li>Scheduling fully optimized for energy efficiency.</li>
 <li>Numerous enhancements to advanced resource reservations (e.g. start or
-end the reservation early depending upon the workload).</li>
+    end the reservation early depending upon the workload).</li>
 <li>Add Kerberos credential support including credential forwarding
-and refresh.</li>
+    and refresh.</li>
 <li>Improved support for provisioning and virtualization.</li> 
 <li>Provide a web-based SLURM administration tool.</li>
-<li>Scheduling optimized for energy efficiency.</li>
-<li>Integration with
-<a href="http://en.wikipedia.org/wiki/FlexNet_Publisher">FLEXlm (Flexnet Publisher)</a>
-license management.</li>
 <li>Finer-grained BlueGene resouce management (partitions/queues and advanced
-reservations containing less than a whole midplane).</li>
+    reservations containing less than a whole midplane).</li>
 </ul>
 
 <h2><a name="security">Security Patches</a></h2>
@@ -70,25 +104,25 @@ reservations containing less than a whole midplane).</li>
 <a href="http://cve.mitre.org/">http://cve.mitre.org/</a>.</p>
 <ul>
 <li>CVE-2009-0128<br>
-There is a potential security vulnerability in SLURM where a user could
-build an invalid job credential in order to execute a job (under his
-correct UID and GID) on resources not allocated to that user. This
-vulnerability exists only when the crypto/openssl plugin is used and was
-fixed in SLURM version 1.3.0.</li>
+    There is a potential security vulnerability in SLURM where a user could
+    build an invalid job credential in order to execute a job (under his
+    correct UID and GID) on resources not allocated to that user. This
+    vulnerability exists only when the crypto/openssl plugin is used and was
+    fixed in SLURM version 1.3.0.</li>
 <li>CVE-2009-2084<br>
-SLURM failed to properly set supplementary groups before invoking (1) sbcast
-from the slurmd daemon or (2) strigger from the slurmctld daemon, which might
-allow local SLURM users to modify files and gain privileges. This was fixed
-in SLURM version 1.3.14.</li>
+    SLURM failed to properly set supplementary groups before invoking (1) sbcast
+    from the slurmd daemon or (2) strigger from the slurmctld daemon, which might
+    allow local SLURM users to modify files and gain privileges. This was fixed
+    in SLURM version 1.3.14.</li>
 <li>CVE-2010-3308<br>
-There is a potential security vulnerability where if the init.d scripts are
-executed by user root or SlurmUser to initiate the SLURM daemons and the
-LD_LIBRARY_PATH is not set and the operating system interprets a blank entry
-in the path as "." (current working directory) and that directory contains a
-trojan library, then that library will be used by the SLURM daemon with
-unpredictable results. This was fixed in SLURM version 2.1.14.</li>
+    There is a potential security vulnerability where if the init.d scripts are
+    executed by user root or SlurmUser to initiate the SLURM daemons and the
+    LD_LIBRARY_PATH is not set and the operating system interprets a blank entry
+    in the path as "." (current working directory) and that directory contains a
+    trojan library, then that library will be used by the SLURM daemon with
+    unpredictable results. This was fixed in SLURM version 2.1.14.</li>
 </ul>
 
-<p style="text-align:center;">Last modified 16 July 2013</p>
+<p style="text-align:center;">Last modified 31 July 2013</p>
 
 <!--#include virtual="footer.txt"-->
-- 
GitLab