The improvements in the new UDS Enterprise available version, our team’s tips to ensure a successful adoption of desktop virtualization and the new Red Hat Enterprise Linux version have been our top 3 post for the last two weeks.
As we trust in our follower’s judgement, we are sharing these articles again just in case you didn’t have the chance to read them:
Most SMBs find really difficult to afford server virtualization costs. That’s why HP has launched a new software defined storage alternative (SDS). The company will give free licences to its clients for more than 72 petabytes SDS capacity.
The only requirement to join this program is to purchase an Intel Xeon E5 v3 processor. After the purchase, a 1TB HP StoreVirtual VSA software licence will be obtained.
This software allows implementing the SDS with a deployment of shared storage which adapts itself to the virtual server that executes Linux Kernel Virtual Machine, VMware or Microsoft Hyper-V.
The educational environment is a complex environment on an IT level, very possibly more than many critical business platforms, because it needs to deploy hundreds of applications and user stations to provide service to the faculty, the students and its own administrative staff.
Furthermore, both in colleges and schools, there must be multidisciplinary classrooms where different courses are taught, with completely different software that needs to be ready in a very short period of time. Many of the tools used in education are Open Source, which generally means that they will require the deployment of user stations under Linux operating systems in its different versions.
A major vulnerability has been discovered that targets bash, the Unix system (including OSX) and Linux commands interpreter. Apparently, this security flaw is also affecting other interpreters, such as ksh, tcsh, zsh and csh. Nevertheless, other shells aren’t being affected.
UDS Enterprise servers aren’t vulnerable to this fail, so the security of the virrual machines which provide UDS Enterprise remains unaltered.
This vulnerability has been registed as CVE-2014-6271 and it allows to execute certain commands due to the wrong process of the environment variables. Besides, it may be exploited remotely.
Citrix has acquired Virtual, a company specialized in ARM-based hypervisors to check and develop mobile applications. This recent purchase has brought to light the new interests of this company, that could be planning to take new steps in the market, like the release of a new virtual mobile infrastructure.
The fact that Virtual employees are experts in hardware, security and jailbreaking prompts other speculations, such as the possibility of developing a mobile hypervisor for smartphones which may allow running operating systems on incompatible devices, improving the security of its existing products or integrating both Citrix and Virtual tecnologies.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.