When the Meltdown and Spectre CPU security vulnerabilities were first publicly disclosed on Jan. 3, they set of a flurry of activity among IT users and cloud operators around the world. In a panel moderated by eWEEK at the OpenStack Summit in Vancouver on May 24, operators detailed how they dealt with the patching process for meltdown and explained why it was a time consuming process.
How CERN Patched 30,000 VMs in its OpenStack Cloud for Meltdown, Spectre
By
Sean Michael Kerner
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis