Hacker Newsnew | comments | show | ask | jobs | submitlogin

The high steal% is intentional, as the CPU is allowed to burst to take advantage of unused resources:


I don't find my cheap t1.micro based IRC bouncer / VPN / reverse SSH endpoint / static-content generation box to be an awful joke at all. They're quite useful for many things.

Applications are open for YC Summer 2015

Guidelines | FAQ | Support | Lists | Bookmarklet | DMCA | Y Combinator | Apply | Contact