Linus Torvalds announced yesterday the availability of Linux 5.4. The latest stable version of this operating system comes with a new security function that has sparked the debate between different sectors of the community. Enabling Lockdown prevents even users with root permissions from making changes to the kernel code. Their opponents claim that it goes against the Open Source philosophy of this project and their supporters praise the security improvements promised by this system.
Red Hat announced earlier this week the general availability of Red Hat Enterprise Linux 8.1, the first version of its enterprise Linux platform that delivers on the release cadence announced at Red Hat Summit 2019, with new versions every six months. The company has strived to improve the management capabilities, security and performance of this operating system.
As usual, in this post we collect the most-read articles in our blog during the last month of October.
The new video tutorial that details the full installation and configuration process of our connection broker for Windows and Linux virtual desktops and applications has been the most visited post. You can read it in the following link: New video tutorial: How to install and configure UDS for VDI.
Fedora 31 is now available for download. One of its most outstanding new features is Fedora Toolbox, a simple tool to start and manage personal workspace containers, which allows developments in an isolated environment. According to Matthew Miller, the project leader, this containerized workflow “is vital for users of the ostree-based Fedora variants such as CoreOS, IoT and Silverblue“, although it is also useful in any workstation or server system.
Version 19 of the Linux MX distribution has already been released. One of the highlights is that it is based on the latest release of Debian, 10.1 (Buster). It is governed by Linux Kernel 4.19 and as a desktop environment uses XFCE 4.14.
The KDE team has released a new version of its popular desktop environment, which has the ability to anticipate user needs. They mean that, for example, the system detects when there is low light and the brightness and color is diminished so that the eyes don’t get so tired. It also knows how to recognize when a presentation is being made, so that messages are not displayed on the screen while the slides are being shown.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.