Denmark’s Agency for Governmental IT Services (Statens It) uses the Open Source cloud platform OpenStack to make its private cloud environment available to all state agencies. Thanks to this new infrastructure, the agencies have a test environment to test and develop new solutions.
Earlier this year Red Hat announced the purchase of CoreOS, a developer company, among other technologies, of Container Linux. This acquisition has laid the foundations for a new project: Fedora CoreOS.
If you are a user of Debian 8 Jessie and wish to continue receiving security updates, you must update to the latest version, Debian 9 Stretch as soon as possible. The previous release of this Linux distro, which was released in 2015 has stopped to have support and, therefore, will no longer receive regular security updates.
After the soaring problems with the Meltdown and Specter, Intel is once again experiencing security-related issues. This time it is a vulnerability called Lazy FP State Restore, which affects the Intel processors with X86 architecture from Sandy Bridge.
The Oak Ridge National Laboratory (ORNL) of the Department of Energy of the United States has presented what they claim is the most powerful and intelligent scientific supercomputer in the world. It is called Summit and is able to perform no less than 200,000 trillion calculations per second.
The use of desktop virtualization is spreading more and more thanks to the fact that these IT infrastructures are increasingly profitable and simpler to design, implement and maintain. This follows the annual survey conducted by VDI Like a PRO, in which 755 respondents participated. Of which, 82% say they are using VDI this year, compared to 77% last year.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.