|
Severity Rating: Critical Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
|
|
Full View / NID: 55882 / Submitted by: The Zilla of Zuron
|
|
In Which We Help the Renowned Panographer Regain Control Internationally acclaimed photographer Ken Duncan has traveled the world for over 35 years in search of stunning images. The Australian photographer—best known for his panoramic landscapes or panographs—has a lot of time, energy and effort invested in his work. His photos have appeared in dozens of […]
|
|
Full View / NID: 55880 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
Full View / NID: 55865 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical Revision Note: V1.1 (September 8, 2015): Revised bulletin to correct the security impact and the vulnerability information for CVE-2015-2506 (from denial of service to elevation of privilege). This is an informational change only. Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, and Microsoft Lync. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts.
|
|
Full View / NID: 55864 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so.
|
|
Full View / NID: 55863 / Submitted by: The Zilla of Zuron
|
|
Imagine 13,000 screaming fans. Add more than a million concurrent viewers online. At the center of it all: one enormous silver trophy. And then the challengers from Team EnvyUs strode into the arena, each one wearing an enormous NVIDIA foam finger. We didn’t know they would do it. We didn’t ask them to do it.… Read More
|
|
Full View / NID: 55859 / Submitted by: The Zilla of Zuron
|
|
It’s been exactly 18 months since we GA’d Horizon Air, VMware’s desktop-as-a-service offering and WOW!, has it been an amazing ride. We’ve been really focused on making improvements in our service, adding new capabilities, and expanding geographically. This is resonating with customers. If you were at VMworld, you got the chance to hear from customers […] The post Horizon Air – Summer 2015 Service Updates and Expansion into Canada appeared first on VMware End-User Computing Blog.
|
|
Full View / NID: 55858 / Submitted by: The Zilla of Zuron
|
|
By Simon Le Comte, Sr. Manager Horizon Air Architects Team, EUC, VMware We’re excited to have announced the Summer 2015 update to Horizon Air. For the Summer 2015 update, we really wanted to focus on enhancing the user experience and improving IT administration time. Let’s take a look at the new features. Next Generation Admin […] The post Technical Overview of the Horizon Air Summer 2015 Service Update appeared first on VMware End-User Computing Blog.
|
|
Full View / NID: 55857 / Submitted by: The Zilla of Zuron
|
|
Thanks to everyone who participated in our VMworld Photo Contest! We received some great entries over the last week, and we couldn’t be more thrilled that you all found a VMware Education and Certification phrase that resonated with you. The following Daily Prize Winners will each receive a one-year Standard subscription to VMware Learning Zone: […] The post VMworld Photo Contest Recap: Meet Our Winners appeared first on VMware Education and Certification Blog.
|
|
Full View / NID: 55856 / Submitted by: The Zilla of Zuron
|
|
By Pam Takahama, Director Solutions Marketing, EUC, VMware With standing room only, the “Embracing Federal Mobility” session demonstrated how pioneers in federal IT are driving transformation within their agencies. In the few minutes leading up to the session, attendees shared a glimpse into federal IT challenges: Think security: When’s the last time Edward Snowden visited […] The post VMworld: “Embracing Federal Mobility” Session-A Day in the Life of Federal IT appeared first on VMware End-User Computing Blog.
|
|
Full View / NID: 55855 / Submitted by: The Zilla of Zuron
|
|
Keeping legacy applications online and available in a fast-moving industry is no easy feat. But VMware vCloud® Air™ can help by extending on-premises subnets to vCloud Air. In this episode of vCloud vTech Talk, our series highlighting tips, tricks and resources for all thing vCloud Air, Jenny Fong, Marketing Manager for vCloud Air, discusses two […] The post vCloud Air vTech Talk: Pushing Legacy Apps to vCloud Air appeared first on VMware vCloud Blog.
|
|
Full View / NID: 55854 / Submitted by: The Zilla of Zuron
|
|
As was mentioned in a previous blog post , accelerator cards are becoming increasingly common in HPC environments and so it is important that we assess the performance of such cards with ESX. Thank you very much to Na Zhang for all of her work on the following. In this post, we share the results of running the Scalable HeterOgeneous Computing ( SHOC ) benchmark and a CUDA-enabled version of the LAMMPS molecular dynamic program on ESX 6.0. We used a loaner nVidia Grid K2 card for this test to demonstrate how closely we can approximate bare-metal performance. The demonstrated results are relevant to HPC users despite the fact that such users will most often use higher-end K40 and K80 cards instead. As you can see in the Figure, ESX 6.0u1 delivers very close to bare-metal performance in all SHOC benchmark categories except those in which data transfer speed is the determining factor. In those cases, we see up to a 20% drop in performance relative to bare-metal. However, using an engineering build of ESX (“Testbuild”) that includes support for Intel VT-d large pages, we see that these performance drops can be completely addressed, restoring bare-metal performance in these cases. Moving beyond low-level benchmarks, we also examined LAMMPS performance when it [...] The post Using nVidia GPGPU Compute Acceleration with ESX 6.0 appeared first on Office of the CTO.
|
|
Full View / NID: 55853 / Submitted by: The Zilla of Zuron
|
|
Did you know that in each of the past 4 years the VMware’s Hands-on Labs (HOL) have doubled the number of women staff members from one year to the next? Impressive? Yes. Accidental? No. The Hands-on Labs team is staffed by hundreds of VMware technical experts. These volunteers create lab content so that customers and […] The post Technical Women of the VMware Hands-on Labs appeared first on VMware Hands-On Lab (HOL) Blog.
|
|
Full View / NID: 55852 / Submitted by: The Zilla of Zuron
|
|
In our previous post, we discussed how developers can quickly provision application infrastructure using instances and images in OpenStack. Today, we’ll discuss an important topic: Networking! How do we configure the networks that OpenStack instances use to communicate with each other and with the outside world? VMware Integrated OpenStack provides two networking options for your […] The post VMware Integrated OpenStack Video Series: Working with Networks appeared first on OpenStack Blog for VMware.
|
|
Full View / NID: 55851 / Submitted by: The Zilla of Zuron
|
|
Last year I had the opportunity to present a session at the J. Boye Web and Intranet Conferencein Philadelphia. The session was about building a successful enterprise social network (ESN) – an internal social network used by employees within a business. This has been my profession and passion for the past 5+ years, so I was pleased to talk about it and to hear others’ experiences as well. Read more on #TipTuesday - Have a Full-time Community Manager From the Start…
|
|
Full View / NID: 55850 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
|
|
Full View / NID: 55849 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Active Directory. The vulnerability could allow denial of service if an authenticated attacker creates multiple machine accounts. To exploit the vulnerability an attacker must have an account that has privileges to join machines to the domain.
|
|
Full View / NID: 55848 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker runs a specially crafted application that could cause Windows Hyper-V to improperly check configuration settings. Customers who have not enabled the Hyper-V role are not affected.
|
|
Full View / NID: 55847 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow information disclosure if Outlook Web Access (OWA) fails to properly handle web requests, and sanitize user input and email content.
|
|
Full View / NID: 55846 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (September 8, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
|
|
Full View / NID: 55845 / Submitted by: The Zilla of Zuron
|
|
G-Series SoC Delivers Enhanced Performance, Security and Power Management Technology Ideal for Enterprise IT Environments
SAN FRANCISCO, CA -- (Marketwired) -- 09/08/15 --
AMD (NASDAQ: AMD) today announced that Fujitsu selected the AMD Embedded G-Series SoC (system-on-chip), formerly codenamed "Steppe Eagle," for the newest additions to the FUJITSU Thin Client FUTRO family. The new FUJITSU FUTRO S920, S720 and S520 are powered by AMD Embedded G-Series SoCs that couple high performance computing and graphics capability in a highly integrated, low power design. The updated FUJITSU FUTRO thin clients deliver 20% higher frequency at the top end of the performance envelope compared to previous...
|
|
Full View / NID: 55844 / Submitted by: The Zilla of Zuron
|
|
We’ll show this week how we’ve integrated our GPU-accelerated Iray renderer with MAXON CINEMA 4D, at IBC, in Amsterdam, the world’s premier event for entertainment and news production pros. The combination revolutionizes interactive rendering for filmmakers and others in the entertainment industry. NVIDIA Iray produces physically based, photorealistic imagery and animations users can interact with… Read More
|
|
Full View / NID: 55843 / Submitted by: The Zilla of Zuron
|
|
Softonic selects RiskIQ’s automated malware detection technology to identify and eradicate security threats on Softonic’s 160,000 software titles London, UK 08/09/2015 - RiskIQ, the digital footprint security company, today announced software application discovery platform Softonic has selected RiskIQ’s malware detection and identification capabilities as part of its Clean & Safe campaign.Softonic’s Clean & Safe campaign aims to completely eradicate malware on the Softonic software catalogue - the largest of its kind on the Internet. By...
Source: RealWire
|
|
Full View / NID: 55842 / Submitted by: The Zilla of Zuron
|
|
Acquisition will expand Interoute's networked cloud and communications services to national and multinational enterprises across the world.London 8th September 2015, Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, announced today that it has entered into an agreement to acquire European managed services provider Easynet, subject to certain customary closing conditions. The transaction places an enterprise value of £402 million on Easynet. On a pro forma basis, after giving effect...
Source: RealWire
|
|
Full View / NID: 55841 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
Full View / NID: 55840 / Submitted by: The Zilla of Zuron
|
|
Foobar2000 is an advanced audio player for the Windows platform. Some of the basic features include ReplayGain support, low memory footprint and native support for several popular audio formats.
|
|
Full View / NID: 62751 / Submitted by: TACKtech Team
|
|
Technology breakthrough: 2TB on a slim 7mm laptop drive Seagate last week announced a technology breakthrough that enables up to 2TB of capacity in a slim 7mm hard drive. In an industry first, Seagate engineers boosted areal density to 1TB-per-platter in a 2.5-inch form factor. The breakthrough was achieved using shingled-magnetic recording (SMR) technology, in which […]
|
|
Full View / NID: 55881 / Submitted by: The Zilla of Zuron
|
|
Through a combination of its conference, exhibition and networking, for nearly a decade Storage Focus has offered a comprehensive perspective on the changes within the storage, server & networking marketplace. The aim of this year’s event, being held 16-18th September at the Fairmont Rey Juan Carlos I in Barcelona, Spain, is to provide access to […]
|
|
Full View / NID: 55839 / Submitted by: The Zilla of Zuron
|
|
VMware participera aux Assises de la Sécurité 2015 du 30 …
Read More
|
|
Full View / NID: 55838 / Submitted by: The Zilla of Zuron
|
|
Tras el parón veraniego, volvemos con el primer …
Read More
|
|
Full View / NID: 55837 / Submitted by: The Zilla of Zuron
|