Debian development team has released a security update for 8.5 version, which armours Linux core in Debian.
This update solves a very important vulnerability related to Linux Kernel, that opened the door to other machines to leak into TCP/IP protocol. The hacker could see everything the user did in the Internet and also insert malicious messages inside this protocol.
The last Akademy event organized by KDE Project introduced plenty of news, like the KDE Store, an online shop where you can buy software and other elements related to the environment through a platform based on OpenDesktop and free sharing.
OpenDesktop’s source code has been released under AGPL license and KDE has used it to build a new application shop, where you can donate to developers, artists…
We’re back to school and to start the week we’re compiling the most read articles in our blog during the summer. The comparison between Microsoft‘s and VMware‘s hypervisors, the deployment of an Open Source desktop virtualization infrastructure with oVirt* and the list of the top 2015 Open Source software have been the most popular posts.
Find below the links to these articles so that you can keep up to date with the most outstanding topics related to VDI and Open Source according to our followers:
Red Hat announced during Red Hat Summit 2016 a new set of Linux container solutions for the enterprise, including free development tools, a comprehensive container platform that integrates management, Platform-as-a-Service (PaaS) and Containers-as-a-Service (CaaS).
This new offering enables customers to leverage the full benefits of containerization with more secure, portable and consistent container-based solutions, supporting key open standards such as the Open Container Initiative (OCI) container format and Kubernetes orchestration.
The 12th edition of Red Hat Summit will start Next Monday 27th June. During 4 days, San Francisco Moscone Center will host the Open Source conference designed for and by developers accross the globe.
This is the premier Open Source technology event where speakers and attendees share their ideas and innovations on cloud computing, platform, virtualization, middleware, storage, and systems management technologies.
Linux and Unix are not the same, but would you know how to explain the differences between them?
Unix is a propietary system which can’t be modified, only AT&T, the company that created and owns it can do it. It was developed in the 1970s as an operating system to manage servers and nowadays it is mainly used for that purpose, except MacOS X, a desktop OS. Server operating systems are difficult to install, commands are more important than graphic interface and they are only compatible with specific hardware. AIS, HP-UX or Soralis are some Unix systems examples.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.