Did you realize Linux is present each day in more technological environments? Thanks to the free software flexibility and Open Source possibilities for collaborative development, the developments with this operating system are increasingly numerous and do not adhere only to PCs.
Mobile devices are one of these areas. Not only Android is based on Linux. Some of the new mobile operating systems, like Tizen, Sailfish OS or Firefox OS also carry the heart of the penguin software.
Desktop virtualization as a new ally for Education, the benefits of application virtualization and software defined storage are the most interesting topics we talked about in this blog for the last two weeks according to our readers.
If you didn’t have the chance to read them when we published them, find below the links to these articles so that you keep up with the latest and most interesting news suggested by our followers:
Linux Foundation is moving forward in the telecommunications sector. This week they have announced the birth of an Open Source platform that aims to speed up the introduction of new products and services thanks to Network Functions Virtualization (NFV). This project is called Open Platform for NFV (OPNFV) and it is supported by vendors and telecom operators, such as AT&T, Red Hat, HP, Cisco or Citrix.
This new initiative will accelerate the delivery of cloud-based models to operators, enable interoperability and will accelerate standards through an Open Source reference platform.
The improvements in the new UDS Enterprise available version, our team’s tips to ensure a successful adoption of desktop virtualization and the new Red Hat Enterprise Linux version have been our top 3 post for the last two weeks.
As we trust in our follower’s judgement, we are sharing these articles again just in case you didn’t have the chance to read them:
A major vulnerability has been discovered that targets bash, the Unix system (including OSX) and Linux commands interpreter. Apparently, this security flaw is also affecting other interpreters, such as ksh, tcsh, zsh and csh. Nevertheless, other shells aren’t being affected.
UDS Enterprise servers aren’t vulnerable to this fail, so the security of the virrual machines which provide UDS Enterprise remains unaltered.
This vulnerability has been registed as CVE-2014-6271 and it allows to execute certain commands due to the wrong process of the environment variables. Besides, it may be exploited remotely.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.