Louisiana Department of Health and Hospitals (DHH) is working with an Open Source project to evacuate citizens in case of dangerous storms or hurricanes.
With support from Boundless, they are deploying GeoSHAPE, a software designed for humanitarian assistance which helps identifying hospitals and other sanitary services at risk for flooding and damage from storms and hurricanes.
Google and Red Hat have been working together to release a patch for a bug in GNU C Library or glibc, used by most Linux applications, distros and devices.
This vulnerability can be remotely exploited when users click on a link or connect to a Linux server, allowing cybercriminals to steal passwords, spy on users or seize control of computers.
The choice of UDS Enterprise as best VDI tech and pricing proposal by a commitee comprised of experts from more than 20 Spanish universities, the video showing how application virtualization with UDS Enterprise works and a list of Open Source firewalls for SMBs have been the most read posts in our blog during the last weeks.
Find below the links to the most interesting news according to our followers just in case you dind’t have the chance to read them yet:
All companies must secure their networks with strong security systems, and small and medium-sized enterprises are no exception. But security is not incompatible with cost savings. Currently there are Open Source firewall which can suit SMBs‘ needs:
–Endian Firewall. This software is a Linux distro optimized for security works. It provides firewall, intrusion prevention and detection, anti-virus, anti-spam, VPN and secure remote access, and high availability. There’s a free edition and a commercial version with advanced features and add-ons support.
Tech giants are lately releasing the code of many solutions. It seems to be an altruist way of helping the Open Source community, but this supposed change of mind could be part of an enterprise strategy.
Such is the case of Google and Microsoft, that are hitting the headlines and social media for open sourcing some of their products.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.