The new way of working that came with the Coronavirus is still a current issue. The articles related to remote working in our blog have been the ones that have aroused the most interest among our followers during this last month.
Linus Torvalds announced the availability of Linux 5.7. This new version of the kernel comes with a long list of new features. In this article, we will mention some of the most significant ones.
Microsoft Virtual Studio Code editor is widely used by developers around the world. It is an Open Source software that is available for download under MIT license. The problem is that official binary compilations are not exactly the same as the public source code. They include a telemetry system enabled by default with a series of components that track the actions performed within the editor.
The change from a proprietary to a free and Open Source environment is often looked on with mistrust by employees, especially when it involves adapting to something new. The municipality of Eyüpsultan in Turkey decided to implement the Open Source model for their computer desktops. They managed to do it successfully and with great criticism from users following a simple premise: the new Open Source desktops had to look a lot like the ones used by workers.
Mobile gaming company King has decided to share the source code of the Defold graphics engine. This cross-platform software has always been free. The company has now gone a step further by releasing the source code and making it available to all users at GitHub.
The security firm Check Point warns of a significant increase in the number of cyber-attacks that take advantage of the search for information about the Covid-19 to infect more and more users. During the last three weeks, there have been 30% more threats, specifically about 192,000 weekly. 17% of the newly registered domains related to Coronavirus are malicious or suspicious and new phishing campaigns have been discovered that impersonate the World Health Organization (WHO) and popular video conferencing platforms to steal sensitive information.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.