You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficserver.apache.org by zw...@apache.org on 2014/07/21 17:47:06 UTC

svn commit: r1612324 - in /trafficserver/site/trunk/content: acknowledgements.mdtext index.html

Author: zwoop
Date: Mon Jul 21 15:47:05 2014
New Revision: 1612324

URL: http://svn.apache.org/r1612324
Log:
Added GoDaddy to the acks

Modified:
    trafficserver/site/trunk/content/acknowledgements.mdtext
    trafficserver/site/trunk/content/index.html

Modified: trafficserver/site/trunk/content/acknowledgements.mdtext
URL: http://svn.apache.org/viewvc/trafficserver/site/trunk/content/acknowledgements.mdtext?rev=1612324&r1=1612323&r2=1612324&view=diff
==============================================================================
--- trafficserver/site/trunk/content/acknowledgements.mdtext (original)
+++ trafficserver/site/trunk/content/acknowledgements.mdtext Mon Jul 21 15:47:05 2014
@@ -26,3 +26,4 @@ contributions of the following companies
 * [The Measurement Factory](http://www.measurement-factory.com/), for letting us run their Co-Advisor test suite against Apache Traffic Server.
 * [Comcast](http://www.comcast.com), providing hardware for our build system.
 * [Rackspace](http://www.rackspace.com), for providing virtualized resources to our Continuous Integration system.
+* [GoDaddy](http://www.godaddy.com), for providing SSL certificates for our sites.

Modified: trafficserver/site/trunk/content/index.html
URL: http://svn.apache.org/viewvc/trafficserver/site/trunk/content/index.html?rev=1612324&r1=1612323&r2=1612324&view=diff
==============================================================================
--- trafficserver/site/trunk/content/index.html (original)
+++ trafficserver/site/trunk/content/index.html Mon Jul 21 15:47:05 2014
@@ -68,7 +68,7 @@
             certain conditions. Everyone is encouraged to upgrade as soon as possible. For more
             details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>.
             New releases addressing this issue are available on the <a href="downloads">Download page</a>.
-						The latest release is v4.1.2.
+						The latest release is v5.0.0.
       </div> 
     </div>
     <div class="fourcol right last">