Posts Tagged ‘ linux ’

VMware brengt Workstation 12 Pro en Player

3 september 2015
By

VMware, specialist in cloud-infrastructuur en business mobility, kondigt VMware Workstation 12 Pro en Player aan, de nieuwste versies van zijn pc-virtualisatiesoftware. Workstation 12 Pro biedt meer dan veertig nieuwe functies, waarmee het de nieuwste software- en hardwaretechnologieën ondersteunt.



VMware Workstation 12 Pro ondersteunt de nieuwe Windows 10-release en de nieuwste Linux-distributie. Het transformeert de manier waarop technische professionals software ontwikkelen, testen, demonstreren en installeren, doordat meerdere x86-besturingssystemen tegelijk naast elkaar kunnen draaien op dezelfde pc.

VMware Workstation 12 Pro stelt it-professionals en ontwikkelaars in staat binnen Windows 10 te testen en te ontwikkelen met hun bestaande Windows- of Linux-pc. VMware Workstation 12 Pro ondersteunt Microsoft DirectX 10 en OpenGL 3.3, en breidt het aantal grafische 3D-applicaties dat binnen de virtuele machine kan draaien uit. De oplossing biedt hogere prestaties waardoor de productiviteit en gebruikerservaring worden verbeterd. Veeleisende applicaties draaien sneller en efficiënter. VMware Workstation 12 Pro is geoptimaliseerd om 4K Ultra HD (3840 x 2160)-desktopschermen en QHD+ (3200 x 1800)-laptop en tabletschermen te ondersteunen.

Klanten die VMware Workstation 11 en VMware Player 7 Plus tussen 29 juli 2015 en 30 september 2015 hebben aangeschaft, krijgen een gratis elektronische upgrade.

Bron: Computable Lees het complete artikel hier: http://www.computable.nl/artikel/producten/cloud_computing/5588048/2333364/vmware-brengt-workstation-12-pro-en-player.html

Nvidia boost bladeservers voor VDI

3 september 2015
By

Chipmaker Nvidia mikt met zijn nieuwste graphics-technologie op grootzakelijke gebruikers van virtuele desktops. Het grid-platform geeft bladeservers een gpu-boost.


Prestaties en toepassingen

Ook zware ontwerpsoftware

Bron: Computable Lees het complete artikel hier: http://www.computable.nl/artikel/technologie/5591778/5182002/nvidia-boost-bladeservers-voor-vdi.html

Apple Devices Creating Blind Spot for IT Security

2 september 2015
By

Although Apple devices may be among the best in terms of overall security and the lower number of attacks directed their way compared with other devices, the way Apple products are used inside the enterprise still represents a significant security and compliance threat. A survey of 2,249 workers in the United States conducted by Dimensional Research on behalf of Centrify, a provider of identity management software, finds there a lot of employee-owned Apple devices in the enterprise and that the majority of them are used to access corporate data that is not encrypted. Perhaps even more troublesome, most end users admit that the passwords they do use on these devices are overly simple and that they share them with others. This creates a significant opportunity for solution providers across the channel to start a conversation about what it will take to secure those devices. The biggest issue, however, may be that most internal IT organizations are in denial about how widely Apple devices are used to access business apps, versus just surfing the Web.

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/slideshows/apple-devices-creating-blind-spot-for-it-security.html/

Breach Recovery Costs More in Virtual Environments

31 augustus 2015
By

Businesses pay nearly double to recover from a security breach if a virtual infrastructure is affected during a cyber-attack, according to a new survey of 5,500 companies released by security specialist Kaspersky Lab in cooperation with market research firm B2B International. It doesn’t matter if the company is a large enterprise or a small and midsize business (SMB)—recovering from a security breach involving a virtual infrastructure will result in much higher costs than a security breach in a physical infrastructure. Kaspersky Lab attributes the higher cost to the majority of businesses using virtual environments for their most critical business processes. Security breaches in virtual environments also require additional cost for third-party expertise. Also, many businesses believe that security risks are lower in virtual environments and, often, don’t deploy security solutions designed for virtual environments. This opens up opportunities for service providers to help their customers lower their overall risks in virtual environments through education and new solutions. Here are 15 reasons why this is vital.

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/slideshows/breach-recovery-costs-more-in-virtual-environments.html/

Hands on with Windows Server 2016 Containers

31 augustus 2015
By

First Look Microsoft has released Technical Preview 3 of Windows Server 2016, including the first public release of Windows Server Containers, perhaps the most interesting new feature.

A container is a type of virtual machine (VM) that shares more resources than a traditional VM.

“For efficiency, many of the OS files, directories and running services are shared between containers and projected into each container’s namespace,” said Azure CTO Mark Russinovich.

Containers are therefore lightweight, so you can run more containers than VMs on a host server. They are also less flexible. Whereas you can run Linux in a VM running on Windows, that idea makes no sense for a container, which shares operating system files with its host.

Containers have existed for a long time on Unix-like operating systems, but their usage for application deployment increased following the release of Docker as an open source project in early 2013.

Docker provides a high-level API and tools for managing and deploying Linux container images, and Docker Hub is a public repository of container images.

The popularity of Docker has helped to promote a distinctive approach to application deployment, where developers focus on creating container images which can be deployed multiple times.

The live instances are disposable, and you update an application by updating and redeploying the images. Each image may implement a relatively small piece of functionality, which fits well with a style of software architecture called microservices.

Containers are now a Windows Server feature

Containers are now a Windows Server feature

Windows developers have missed out on the container fun, but Microsoft is putting that right in Server 2016 and on its Azure cloud platform. Container support is now

Bron: The Register Lees het complete artikel hier: http://go.theregister.com/i/cfa/http://www.theregister.co.uk/2015/08/31/hands_on_with_windows_server_2016_containers/

Hardened Linux stalwarts Grsecurity pull the pin after legal fight

28 augustus 2015
By

The gurus behind the popular and respected Linux kernel hardening effort Grsecurity will stop providing free support for their stable offering. In future, only paying sponsors will get stable patches to shore up their kernels’ defenses.

The public stable patches will not be distributed beyond the next two weeks in response to an expensive and lengthy court case between the small outfit and a “multi-billion dollar” corporation which it says flagrantly infringed its rights. Beta-test-grade patches will still be available for all.

Grsecurity man Brad Spengler says he has “had enough” of the embedded device industry ripping off his company’s efforts, trashing its trademarks, and breaching the source code’s open-source GPL license, without donating “a single dime.”

The straw that broke the camel’s back was an face-off in which Spengler says “a multi-billion dollar corporation had made Grsecurity a critical component of their embedded platform.”

Spengler’s not no problem with that, but is concerned “… they’re using an old, unsupported kernel and a several year old, unsupported version of grsecurity that they’ve modified.” That gets Spengler’s goat, because he thinks it is typically slack practice “for the embedded Linux industry, seemingly driven by a need to mark a security checkbox at the lowest cost possible. So it’s no surprise that they didn’t bother to hire us to perform the port properly for them or to actively maintain the security of the kernel they’re providing to their paid customers.”

But Spengler can’t tolerate the fact “the aforementioned company has been using the grsecurity name all over its marketing material and blog posts to describe their backported, unsupported, unmaintained version in a version of Linux with other code modifications that haven’t been evaluated by us for security impact.”

“Simply put, it is NOT grsecurity – it doesn’t meet our standards and at the same time it

Bron: The Register Lees het complete artikel hier: http://go.theregister.com/i/cfa/http://www.theregister.co.uk/2015/08/27/grsecurity/

DDN: Quicker storage access passes HPC buck to CPU makers

27 augustus 2015
By

Comment At a DDN user group meeting in Frankfurt earlier this year, Alex Bouzari said high-performance computing (HPC) exhibits an enduring tug-of-war between compute and storage.

The co-founder and CEO of DataDirect Networks – which makes fast-access and capacious storage for supercomputing and HPC – speaks from the storage side of the struggle and is repeating a point of view held by many.

Applications running in this HPC world need immense CPU and data storage resources. Typically, sets of processors have parallel access to sets of storage nodes: fast CPUs making best use of slow-spinning disks.

Supercomputers and HPC installations were once compute-bound, with the run-time of apps featuring much more CPU time than IO time.

As supercomputers and HPC server processors became faster, the applications they ran moved into the IO-bound world. The application software spent more time waiting for IO than processing data. However, their users didn’t want to wait for storage arrays with serial IO access.

Parallel file systems, like IBM’s GPFS and Lustre, provided a popular way of enabling lots more access to storage resources … and the apps, now getting data faster, reverted to being compute-bound.

But Moore’s Law had its way and processors became even more powerful, with multi-threading, multiple cores, and multi-socket servers, shortening the CPU-run time for HPC apps and making them IO-bound once more. Which is where we are today.

Bouzari says the balance can be redressed by inserting a faster-than-disk, drop-in, solid-state tier between the compute servers and the storage nodes, effectively relegating the disk-based nodes to a backing store.

The new tier uses PCIe flash and NVMe drivers. This has similarities to an EMC DSSD (rack-scale flash storage) implementation at a University of Texas supercomputing centre, TACC.

The DDN idea has working set data in its five million IOPS WolfCreek devices, with their

Bron: The Register Lees het complete artikel hier: http://go.theregister.com/i/cfa/http://www.theregister.co.uk/2015/08/27/bypassing_posix_in_the_serverstorage_io_equation/

Hardened Linux stalwarts grsecurity pull the pin after legal fight

27 augustus 2015
By

The gurus behind the popular and respected Linux kernel hardening service Grsecurity have decided to stop providing support for its stable offering.

Patches will be ceased in the next two weeks in response to an expensive and lengthy court case between the small outfit and a “multi-billion dollar” corporation which it says flagrantly infringed its trademark.

Grsecurity man Brad Spengler says he has “had enough” of the embedded device industry ripping of his company’s efforts, trashing its trademarks and breaching the GPL, without donating “a single dime”.

The straw that broke the camel’s back was an incident in which Spengler says “A multi-billion dollar corporation had made Grsecurity a critical component of their embedded platform.”

Spengler’s not no problem with that, but is concerned “… they’re using an old, unsupported kernel and a several year old, unsupported version of grsecurity that they’ve modified.” That gets Spengler’s goat, because he thinks it is typically slack practice “for the embedded Linux industry, seemingly driven by a need to mark a security checkbox at the lowest cost possible. So it’s no surprise that they didn’t bother to hire us to perform the port properly for them or to actively maintain the security of the kernel they’re providing to their paid customers.”

But Spengler can’t tolerate the fact “The aforementioned company has been using the grsecurity name all over its marketing material and blog posts to describe their backported, unsupported, unmaintained version in a version of Linux with other code modifications that haven’t been evaluated by us for security impact.”

“Simply put, it is NOT grsecurity – it doesn’t meet our standards and at the same time it uses our brand and reputation to further its marketing.”

“They are publishing a ‘grsecurity’ for a kernel version we never released a patch for.”

“We decided that it is unfair to our sponsors that

Bron: The Register Lees het complete artikel hier: http://go.theregister.com/i/cfa/http://www.theregister.co.uk/2015/08/27/grsecurity/

Met Mac in Windows 10 via Parallels Desktop 11

25 augustus 2015
By

Met Parallels Desktop 11 kunnen Mac-gebruikers in Windows 10 werken en profiteren van de voordelen van Cortana, de intelligente persoonlijke assistent van Microsoft, zowel in Windows als in OS X. Dit is de allereerste keer dat Parallels Desktop een Windows-functie beschikbaar maakt voor OS X-apps. Parallels Desktop 11 voorziet ook in experimentele ondersteuning voor OS X El Capitan.



Parallels Desktop 11 voor Mac stelt gebruikers in staat om een preview uit te voeren op Windows-machines en geneste virtualisatie te gebruiken voor zowel Windows- als Linux-gasten. De professionele editie is een nieuwe versie van de software die specifiek is ontworpen voor ontwikkelaars, ontwerpers en intensieve gebruikers, die hiermee een aantal krachtige hulpprogramma’s in handen krijgen waarmee ze hun productiviteit kunnen maximaliseren. De professionele editie ondersteunt integratie met populaire hulpprogramma’s voor ontwikkelaars, zoals Docker, Visual Studio (plug-in), Chef and Jenkins, Vagrant, Guest OS-debugging en netwerksimulatie.

De zakelijke editie van Parallels Desktop voor Mac, voorheen Parallels Desktop for Mac Enterprise Edition, biedt alle functies van de professionele editie en voorziet it-beheerders van de meest efficiënte manier om medewerkers op een Mac met Windows-apps te laten werken.

Bron: Computable Lees het complete artikel hier: http://www.computable.nl/artikel/producten/besturingssystemen/5545653/1277048/met-mac-in-windows-10-via-parallels-desktop-11.html

Security Vendor LightCyber Launches Channel Program

21 augustus 2015
By

LightCyber’s Active Breach Detection, only sold through the channel, looks at user behavior and known attack vendors to curtail potential security breaches.

Looking for partners that can help drive a new approach to managing security breaches, LightCyber unveiled a channel program aimed at solution providers that either already have or are looking to acquire additional security expertise.

Jason Matlof, executive vice president of LightCyber, said the LightCyber Channel Alliance program is designed to drive adoption of an Active Breach Detection offering to help make it faster and simpler for IT organizations to discover and isolate malware.

“Our assumption is that the organization has already been breached,” said Matlof. “We profile all the users and devices on the network to identify anomalous behavior.”

Sold only via the channel, the Active Breach Detection platform provides organizations with an alternative to using security information event management (SIEM) platforms to search through log files in the hope of discovering anomalies, Matlof said. In its place, the Active Breach Detection platform from CyberLight correlates user behavior with known attack vectors to identify potential security breaches faster and with a high degree of confidence.

One of the banes of IT security today, noted Matlof, is that many IT security products generate too many false positives. The end result is a continuous stream of alerts that the IT organization eventually starts to ignore because they end up wasting time on the IT security equivalent of a wild goose chase. Rather than generating alerts based on, for example, the existence of some type of binary file, the LightCyber Active Breach System correlates those events against known end-user behavior patterns.

To make it simpler to resell the Active Breach System or build a managed service around it, LightCyber provides access to a wealth of online training material that partners need to be certified on

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/security-vendor-lightcyber-launches-channel-program.html/