Software developers use Linux containers to save time and money, providing a mechanism to build much more manageable applications through development, testing and environments of implementation with a better security in the software life cycle as in their actions and scenarios.
According to Forrester, more than half of operations and IT development responsible see security as the biggest concern when adopting containers.
Nutanix announced during the first European event .NEXT Conference that it will extend its one-click Datacenter automation capabilities to include network visualization, security and orchestration.
The manager of hyperconverged infrastructures Nutanix Prism will provide a centralized visualization of the virtual and physical networks topology. IT teams will get a comprehensive view of how individual virtual machines are connected to the network infrastructure and will get health and performance statistics of the network environment.
Red Hat has recently announced the general availability of Red Hat Enterprise Linux (RHEL) 7.3, including new features that improve performance, security, and reliability.
As to performance, RHEL 7.3 adds lightweight tunnels, enabling guest instances of Red Hat Enterprise Linux 7.3 to be more secure, efficient, scalable and flexible. Additionally, enhancements to the bulk packet memory allocator improve performance for both 40 and 100 Gb networking interfaces. Among other things, high-transaction applications have now lower and RHEL now supports the Block SCSI layout format and the Flex Files layout format to manage more easily Parallel NFS (pNFS) clusters.
A new case study on our UDS Enterprise connection broker and a Spanish university, a report by the renowned consulting firm IDC recommending our software for VDI and a new vulnerability detected in Linux have been the most outstanding topics in our blog for the last two weeks.
Below you can find the links to the articles on these topics just in case you dind’t have the chance to read the most interesting news on virtualization and Open Source according to our community:
The OpenNebula project announced a few days ago the availability of the stable release of OpenNebula 5.2 Excession. In this release, some features introduced in 5.0 wizard has been stabilized and those features and components more demanded by the community have been implemented. Almost every component of OpenNebula has been reviewed to target usability and functional improvements.
Corero Network Security identified a zero-day vulnerability in LDAP protocol that enables to amplify Distributed Denial of Service attacks (DDoS) 50 times, making them much more effective and much more difficult to mitigate.
This protocol, mainly used in Windows Server Active Directory administration tool has become an ally for cybercriminals, that leverage vulnerable servers supporting LDAP to bounce junk traffic to a server with a single IP address, so the service is overcrowded and stops working.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.