Linux Foundation is moving forward in the telecommunications sector. This week they have announced the birth of an Open Source platform that aims to speed up the introduction of new products and services thanks to Network Functions Virtualization (NFV). This project is called Open Platform for NFV (OPNFV) and it is supported by vendors and telecom operators, such as AT&T, Red Hat, HP, Cisco or Citrix.
This new initiative will accelerate the delivery of cloud-based models to operators, enable interoperability and will accelerate standards through an Open Source reference platform.
Most SMBs find really difficult to afford server virtualization costs. That’s why HP has launched a new software defined storage alternative (SDS). The company will give free licences to its clients for more than 72 petabytes SDS capacity.
The only requirement to join this program is to purchase an Intel Xeon E5 v3 processor. After the purchase, a 1TB HP StoreVirtual VSA software licence will be obtained.
This software allows implementing the SDS with a deployment of shared storage which adapts itself to the virtual server that executes Linux Kernel Virtual Machine, VMware or Microsoft Hyper-V.
A major vulnerability has been discovered that targets bash, the Unix system (including OSX) and Linux commands interpreter. Apparently, this security flaw is also affecting other interpreters, such as ksh, tcsh, zsh and csh. Nevertheless, other shells aren’t being affected.
UDS Enterprise servers aren’t vulnerable to this fail, so the security of the virrual machines which provide UDS Enterprise remains unaltered.
This vulnerability has been registed as CVE-2014-6271 and it allows to execute certain commands due to the wrong process of the environment variables. Besides, it may be exploited remotely.
Citrix has acquired Virtual, a company specialized in ARM-based hypervisors to check and develop mobile applications. This recent purchase has brought to light the new interests of this company, that could be planning to take new steps in the market, like the release of a new virtual mobile infrastructure.
The fact that Virtual employees are experts in hardware, security and jailbreaking prompts other speculations, such as the possibility of developing a mobile hypervisor for smartphones which may allow running operating systems on incompatible devices, improving the security of its existing products or integrating both Citrix and Virtual tecnologies.
A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.
The employees welcome this option, as they don’t need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data.
Red Hat has announced the availability of Red Hat Enterprise Linux’s new version, 5.11. The company reinforces its commitment for security and performance introducing important improvements in these areas.
One of the most outstanding features in this edition is the new OpenSCAP version, with new qualified providers for this standard.
This new platform introduces other interesting features, such as new storage controls, improvements in Red Hat Access Support depuration capacities and in Red Hat Enterprise Linux hosts which operate in VMware ESXi.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.