• Linux - это классно, но почему, черт возьми, все еще нужно использовать Windows для запуска некоторых приложений? Статья "Linux Fu: Windows Virtualization the Hard(ware) Way" только подтверждает, что эта проблема остается нерешенной! Да, мы можем использовать Wine или Crossover, но это не решение, а лишь костыль! Почему разработчики не могут просто взять и сделать полноценные версии своих программ для Linux? Это абсурд! Мы заслуживаем лучшего! Неужели кто-то думает, что такие проблемы - это нормально в 2023 году? Хватит терпеть этот позор!

    #Linux #Windows #Virtualization #Технологии #Разработка
    Linux - это классно, но почему, черт возьми, все еще нужно использовать Windows для запуска некоторых приложений? Статья "Linux Fu: Windows Virtualization the Hard(ware) Way" только подтверждает, что эта проблема остается нерешенной! Да, мы можем использовать Wine или Crossover, но это не решение, а лишь костыль! Почему разработчики не могут просто взять и сделать полноценные версии своих программ для Linux? Это абсурд! Мы заслуживаем лучшего! Неужели кто-то думает, что такие проблемы - это нормально в 2023 году? Хватит терпеть этот позор! #Linux #Windows #Virtualization #Технологии #Разработка
    Linux Fu: Windows Virtualization the Hard(ware) Way
    hackaday.com
    As much as I love Linux, there are always one or two apps that I simply have to run under Windows for whatever reason. Sure, you can use wine, Crossover …read more
    1 Yorumlar ·0 hisse senetleri ·0 önizleme
  • Monitoring and Support Engineer at Keyword Studios

    Monitoring and Support EngineerKeyword StudiosPasig City Metro Manila Philippines2 hours agoApplyWe are seeking an experienced Monitoring and Support Engineer to support the technology initiatives of the IT Infrastructure team at Keywords. The Monitoring and Support Engineer will be responsible for follow-the-sun monitoring of IT infrastructure, prompt reaction on all infrastructure incident, primary resolution of infrastructure incidents and support requests.ResponsibilitiesFull scope of tasks including but not limited to:Ensure that all incidents are handled within SLAs.Initial troubleshooting of Infrastructure incidents.Ensure maximum network & service availability through proactive monitoring.Ensure all the incident and alert tickets contain detailed technical information.Initial troubleshooting of Infrastructure incidents, restoration of services and escalation to level 3 experts if necessary.Participate in Problem management processes.Ensure that all incidents and critical alerts are documented and escalated if necessary.Ensure effective communication to customers about incidents and outages.Identify opportunities for process improvement and efficiency enhancements.Participate in documentation creation to reduce BAU support activities by ensuring that the Service Desks have adequate knowledge articles to close support tickets as level 1.Participate in reporting on monitored data and incidents on company infrastructure.Implement best practices and lessons learned from initiatives and projects to optimize future outcomes.RequirementsBachelor's degree in a relevant technical field or equivalent experience.Understanding of IT Infrastructure technologies, standards and trends.Technical background with 3+ years’ experience in IT operations role delivering IT infrastructure support, monitoring and incident management.Technical knowledge of the Microsoft Stack, Windows networking, Active Directory, ExchangeTechnical knowledge of Network, Storage and Server equipment, virtualization and production setupsExceptional communication and presentation skills, with the ability to articulate technical concepts to non-technical audiences.Strong analytical and problem-solving skills.Strong customer service orientation.BenefitsGreat Place to Work certified for 4 consecutive yearsFlexible work arrangementGlobal exposure
    Create Your Profile — Game companies can contact you with their relevant job openings.
    Apply
    #monitoring #support #engineer #keyword #studios
    Monitoring and Support Engineer at Keyword Studios
    Monitoring and Support EngineerKeyword StudiosPasig City Metro Manila Philippines2 hours agoApplyWe are seeking an experienced Monitoring and Support Engineer to support the technology initiatives of the IT Infrastructure team at Keywords. The Monitoring and Support Engineer will be responsible for follow-the-sun monitoring of IT infrastructure, prompt reaction on all infrastructure incident, primary resolution of infrastructure incidents and support requests.ResponsibilitiesFull scope of tasks including but not limited to:Ensure that all incidents are handled within SLAs.Initial troubleshooting of Infrastructure incidents.Ensure maximum network & service availability through proactive monitoring.Ensure all the incident and alert tickets contain detailed technical information.Initial troubleshooting of Infrastructure incidents, restoration of services and escalation to level 3 experts if necessary.Participate in Problem management processes.Ensure that all incidents and critical alerts are documented and escalated if necessary.Ensure effective communication to customers about incidents and outages.Identify opportunities for process improvement and efficiency enhancements.Participate in documentation creation to reduce BAU support activities by ensuring that the Service Desks have adequate knowledge articles to close support tickets as level 1.Participate in reporting on monitored data and incidents on company infrastructure.Implement best practices and lessons learned from initiatives and projects to optimize future outcomes.RequirementsBachelor's degree in a relevant technical field or equivalent experience.Understanding of IT Infrastructure technologies, standards and trends.Technical background with 3+ years’ experience in IT operations role delivering IT infrastructure support, monitoring and incident management.Technical knowledge of the Microsoft Stack, Windows networking, Active Directory, ExchangeTechnical knowledge of Network, Storage and Server equipment, virtualization and production setupsExceptional communication and presentation skills, with the ability to articulate technical concepts to non-technical audiences.Strong analytical and problem-solving skills.Strong customer service orientation.BenefitsGreat Place to Work certified for 4 consecutive yearsFlexible work arrangementGlobal exposure Create Your Profile — Game companies can contact you with their relevant job openings. Apply #monitoring #support #engineer #keyword #studios
    gamejobs.co
    Monitoring and Support EngineerKeyword StudiosPasig City Metro Manila Philippines2 hours agoApplyWe are seeking an experienced Monitoring and Support Engineer to support the technology initiatives of the IT Infrastructure team at Keywords. The Monitoring and Support Engineer will be responsible for follow-the-sun monitoring of IT infrastructure, prompt reaction on all infrastructure incident, primary resolution of infrastructure incidents and support requests.ResponsibilitiesFull scope of tasks including but not limited to:Ensure that all incidents are handled within SLAs.Initial troubleshooting of Infrastructure incidents.Ensure maximum network & service availability through proactive monitoring.Ensure all the incident and alert tickets contain detailed technical information.Initial troubleshooting of Infrastructure incidents, restoration of services and escalation to level 3 experts if necessary.Participate in Problem management processes.Ensure that all incidents and critical alerts are documented and escalated if necessary.Ensure effective communication to customers about incidents and outages.Identify opportunities for process improvement and efficiency enhancements.Participate in documentation creation to reduce BAU support activities by ensuring that the Service Desks have adequate knowledge articles to close support tickets as level 1.Participate in reporting on monitored data and incidents on company infrastructure.Implement best practices and lessons learned from initiatives and projects to optimize future outcomes.RequirementsBachelor's degree in a relevant technical field or equivalent experience.Understanding of IT Infrastructure technologies, standards and trends.Technical background with 3+ years’ experience in IT operations role delivering IT infrastructure support, monitoring and incident management.Technical knowledge of the Microsoft Stack, Windows networking, Active Directory, ExchangeTechnical knowledge of Network, Storage and Server equipment, virtualization and production setupsExceptional communication and presentation skills, with the ability to articulate technical concepts to non-technical audiences.Strong analytical and problem-solving skills.Strong customer service orientation.BenefitsGreat Place to Work certified for 4 consecutive yearsFlexible work arrangementGlobal exposure Create Your Profile — Game companies can contact you with their relevant job openings. Apply
    Like
    Love
    Wow
    Sad
    Angry
    559
    · 0 Yorumlar ·0 hisse senetleri ·0 önizleme
  • For June’s Patch Tuesday, 68 fixes — and two zero-day flaws

    Microsoft offered up a fairly light Patch Tuesday release this month, with 68 patches to Microsoft Windows and Microsoft Office. There were no updates for Exchange or SQL server and just two minor patches for Microsoft Edge. That said, two zero-day vulnerabilitieshave led to a “Patch Now” recommendation for both Windows and Office.To help navigate these changes, the team from Readiness has provided auseful  infographic detailing the risks involved when deploying the latest updates.Known issues

    Microsoft released a limited number of known issues for June, with a product-focused issue and a very minor display concern:

    Microsoft Excel: This a rare product level entry in the “known issues” category — an advisory that “square brackets” orare not supported in Excel filenames. An error is generated, advising the user to remove the offending characters.

    Windows 10: There are reports of blurry or unclear CJKtext when displayed at 96 DPIin Chromium-based browsers such as Microsoft Edge and Google Chrome. This is a limited resource issue, as the font resolution in Windows 10 does not fully match the high-level resolution of the Noto font. Microsoft recommends changing the display scaling to 125% or 150% to improve clarity.

    Major revisions and mitigations

    Microsoft might have won an award for the shortest time between releasing an update and a revision with:

    CVE-2025-33073: Windows SMB Client Elevation of Privilege. Microsoft worked to address a vulnerability where improper access control in Windows SMB allows an attacker to elevate privileges over a network. This patch was revised on the same day as its initial release.

    Windows lifecycle and enforcement updates

    Microsoft did not release any enforcement updates for June.

    Each month, the Readiness team analyzes Microsoft’s latest updates and provides technically sound, actionable testing plans. While June’s release includes no stated functional changes, many foundational components across authentication, storage, networking, and user experience have been updated.

    For this testing guide, we grouped Microsoft’s updates by Windows feature and then accompanied the section with prescriptive test actions and rationale to help prioritize enterprise efforts.

    Core OS and UI compatibility

    Microsoft updated several core kernel drivers affecting Windows as a whole. This is a low-level system change and carries a high risk of compatibility and system issues. In addition, core Microsoft print libraries have been included in the update, requiring additional print testing in addition to the following recommendations:

    Run print operations from 32-bit applications on 64-bit Windows environments.

    Use different print drivers and configurations.

    Observe printing from older productivity apps and virtual environments.

    Remote desktop and network connectivity

    This update could impact the reliability of remote access while broken DHCP-to-DNS integration can block device onboarding, and NAT misbehavior disrupts VPNs or site-to-site routing configurations. We recommend the following tests be performed:

    Create and reconnect Remote Desktopsessions under varying network conditions.

    Confirm that DHCP-assigned IP addresses are correctly registered with DNS in AD-integrated environments.

    Test modifying NAT and routing settings in RRAS configurations and ensure that changes persist across reboots.

    Filesystem, SMB and storage

    Updates to the core Windows storage libraries affect nearly every command related to Microsoft Storage Spaces. A minor misalignment here can result in degraded clusters, orphaned volumes, or data loss in a failover scenario. These are high-priority components in modern data center and hybrid cloud infrastructure, with the following storage-related testing recommendations:

    Access file shares using server names, FQDNs, and IP addresses.

    Enable and validate encrypted and compressed file-share operations between clients and servers.

    Run tests that create, open, and read from system log files using various file and storage configurations.

    Validate core cluster storage management tasks, including creating and managing storage pools, tiers, and volumes.

    Test disk addition/removal, failover behaviors, and resiliency settings.

    Run system-level storage diagnostics across active and passive nodes in the cluster.

    Windows installer and recovery

    Microsoft delivered another update to the Windows Installerapplication infrastructure. Broken or regressed Installer package MSI handling disrupts app deployment pipelines while putting core business applications at risk. We suggest the following tests for the latest changes to MSI Installer, Windows Recovery and Microsoft’s Virtualization Based Security:

    Perform installation, repair, and uninstallation of MSI Installer packages using standard enterprise deployment tools.

    Validate restore point behavior for points older than 60 days under varying virtualization-based securitysettings.

    Check both client and server behaviors for allowed or blocked restores.

    We highly recommend prioritizing printer testing this month, then remote desktop deployment testing to ensure your core business applications install and uninstall as expected.

    Each month, we break down the update cycle into product familieswith the following basic groupings: 

    Browsers;

    Microsoft Windows;

    Microsoft Office;

    Microsoft Exchange and SQL Server; 

    Microsoft Developer Tools;

    And Adobe.

    Browsers

    Microsoft delivered a very minor series of updates to Microsoft Edge. The  browser receives two Chrome patcheswhere both updates are rated important. These low-profile changes can be added to your standard release calendar.

    Microsoft Windows

    Microsoft released five critical patches and40 patches rated important. This month the five critical Windows patches cover the following desktop and server vulnerabilities:

    Missing release of memory after effective lifetime in Windows Cryptographic Servicesallows an unauthorized attacker to execute code over a network.

    Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

    Use after free in Windows KDC Proxy Serviceallows an unauthorized attacker to execute code over a network.

    Use of uninitialized resources in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network.

    Unfortunately, CVE-2025-33073 has been reported as publicly disclosed while CVE-2025-33053 has been reported as exploited. Given these two zero-days, the Readiness recommends a “Patch Now” release schedule for your Windows updates.

    Microsoft Office

    Microsoft released five critical updates and a further 13 rated important for Office. The critical patches deal with memory related and “use after free” memory allocation issues affecting the entire platform. Due to the number and severity of these issues, we recommend a “Patch Now” schedule for Office for this Patch Tuesday release.

    Microsoft Exchange and SQL Server

    There are no updates for either Microsoft Exchange or SQL Server this month. 

    Developer tools

    There were only three low-level updatesreleased, affecting .NET and Visual Studio. Add these updates to your standard developer release schedule.

    AdobeAdobe has releaseda single update to Adobe Acrobat. There were two other non-Microsoft updated releases affecting the Chromium platform, which were covered in the Browser section above.
    #junes #patch #tuesday #fixes #two
    For June’s Patch Tuesday, 68 fixes — and two zero-day flaws
    Microsoft offered up a fairly light Patch Tuesday release this month, with 68 patches to Microsoft Windows and Microsoft Office. There were no updates for Exchange or SQL server and just two minor patches for Microsoft Edge. That said, two zero-day vulnerabilitieshave led to a “Patch Now” recommendation for both Windows and Office.To help navigate these changes, the team from Readiness has provided auseful  infographic detailing the risks involved when deploying the latest updates.Known issues Microsoft released a limited number of known issues for June, with a product-focused issue and a very minor display concern: Microsoft Excel: This a rare product level entry in the “known issues” category — an advisory that “square brackets” orare not supported in Excel filenames. An error is generated, advising the user to remove the offending characters. Windows 10: There are reports of blurry or unclear CJKtext when displayed at 96 DPIin Chromium-based browsers such as Microsoft Edge and Google Chrome. This is a limited resource issue, as the font resolution in Windows 10 does not fully match the high-level resolution of the Noto font. Microsoft recommends changing the display scaling to 125% or 150% to improve clarity. Major revisions and mitigations Microsoft might have won an award for the shortest time between releasing an update and a revision with: CVE-2025-33073: Windows SMB Client Elevation of Privilege. Microsoft worked to address a vulnerability where improper access control in Windows SMB allows an attacker to elevate privileges over a network. This patch was revised on the same day as its initial release. Windows lifecycle and enforcement updates Microsoft did not release any enforcement updates for June. Each month, the Readiness team analyzes Microsoft’s latest updates and provides technically sound, actionable testing plans. While June’s release includes no stated functional changes, many foundational components across authentication, storage, networking, and user experience have been updated. For this testing guide, we grouped Microsoft’s updates by Windows feature and then accompanied the section with prescriptive test actions and rationale to help prioritize enterprise efforts. Core OS and UI compatibility Microsoft updated several core kernel drivers affecting Windows as a whole. This is a low-level system change and carries a high risk of compatibility and system issues. In addition, core Microsoft print libraries have been included in the update, requiring additional print testing in addition to the following recommendations: Run print operations from 32-bit applications on 64-bit Windows environments. Use different print drivers and configurations. Observe printing from older productivity apps and virtual environments. Remote desktop and network connectivity This update could impact the reliability of remote access while broken DHCP-to-DNS integration can block device onboarding, and NAT misbehavior disrupts VPNs or site-to-site routing configurations. We recommend the following tests be performed: Create and reconnect Remote Desktopsessions under varying network conditions. Confirm that DHCP-assigned IP addresses are correctly registered with DNS in AD-integrated environments. Test modifying NAT and routing settings in RRAS configurations and ensure that changes persist across reboots. Filesystem, SMB and storage Updates to the core Windows storage libraries affect nearly every command related to Microsoft Storage Spaces. A minor misalignment here can result in degraded clusters, orphaned volumes, or data loss in a failover scenario. These are high-priority components in modern data center and hybrid cloud infrastructure, with the following storage-related testing recommendations: Access file shares using server names, FQDNs, and IP addresses. Enable and validate encrypted and compressed file-share operations between clients and servers. Run tests that create, open, and read from system log files using various file and storage configurations. Validate core cluster storage management tasks, including creating and managing storage pools, tiers, and volumes. Test disk addition/removal, failover behaviors, and resiliency settings. Run system-level storage diagnostics across active and passive nodes in the cluster. Windows installer and recovery Microsoft delivered another update to the Windows Installerapplication infrastructure. Broken or regressed Installer package MSI handling disrupts app deployment pipelines while putting core business applications at risk. We suggest the following tests for the latest changes to MSI Installer, Windows Recovery and Microsoft’s Virtualization Based Security: Perform installation, repair, and uninstallation of MSI Installer packages using standard enterprise deployment tools. Validate restore point behavior for points older than 60 days under varying virtualization-based securitysettings. Check both client and server behaviors for allowed or blocked restores. We highly recommend prioritizing printer testing this month, then remote desktop deployment testing to ensure your core business applications install and uninstall as expected. Each month, we break down the update cycle into product familieswith the following basic groupings:  Browsers; Microsoft Windows; Microsoft Office; Microsoft Exchange and SQL Server;  Microsoft Developer Tools; And Adobe. Browsers Microsoft delivered a very minor series of updates to Microsoft Edge. The  browser receives two Chrome patcheswhere both updates are rated important. These low-profile changes can be added to your standard release calendar. Microsoft Windows Microsoft released five critical patches and40 patches rated important. This month the five critical Windows patches cover the following desktop and server vulnerabilities: Missing release of memory after effective lifetime in Windows Cryptographic Servicesallows an unauthorized attacker to execute code over a network. Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. Use after free in Windows KDC Proxy Serviceallows an unauthorized attacker to execute code over a network. Use of uninitialized resources in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network. Unfortunately, CVE-2025-33073 has been reported as publicly disclosed while CVE-2025-33053 has been reported as exploited. Given these two zero-days, the Readiness recommends a “Patch Now” release schedule for your Windows updates. Microsoft Office Microsoft released five critical updates and a further 13 rated important for Office. The critical patches deal with memory related and “use after free” memory allocation issues affecting the entire platform. Due to the number and severity of these issues, we recommend a “Patch Now” schedule for Office for this Patch Tuesday release. Microsoft Exchange and SQL Server There are no updates for either Microsoft Exchange or SQL Server this month.  Developer tools There were only three low-level updatesreleased, affecting .NET and Visual Studio. Add these updates to your standard developer release schedule. AdobeAdobe has releaseda single update to Adobe Acrobat. There were two other non-Microsoft updated releases affecting the Chromium platform, which were covered in the Browser section above. #junes #patch #tuesday #fixes #two
    For June’s Patch Tuesday, 68 fixes — and two zero-day flaws
    www.computerworld.com
    Microsoft offered up a fairly light Patch Tuesday release this month, with 68 patches to Microsoft Windows and Microsoft Office. There were no updates for Exchange or SQL server and just two minor patches for Microsoft Edge. That said, two zero-day vulnerabilities (CVE-2025-33073 and CVE-2025-33053) have led to a “Patch Now” recommendation for both Windows and Office. (Developers can follow their usual release cadence with updates to Microsoft .NET and Visual Studio.) To help navigate these changes, the team from Readiness has provided auseful  infographic detailing the risks involved when deploying the latest updates. (More information about recent Patch Tuesday releases is available here.) Known issues Microsoft released a limited number of known issues for June, with a product-focused issue and a very minor display concern: Microsoft Excel: This a rare product level entry in the “known issues” category — an advisory that “square brackets” or [] are not supported in Excel filenames. An error is generated, advising the user to remove the offending characters. Windows 10: There are reports of blurry or unclear CJK (Chinese, Japanese, Korean) text when displayed at 96 DPI (100% scaling) in Chromium-based browsers such as Microsoft Edge and Google Chrome. This is a limited resource issue, as the font resolution in Windows 10 does not fully match the high-level resolution of the Noto font. Microsoft recommends changing the display scaling to 125% or 150% to improve clarity. Major revisions and mitigations Microsoft might have won an award for the shortest time between releasing an update and a revision with: CVE-2025-33073: Windows SMB Client Elevation of Privilege. Microsoft worked to address a vulnerability where improper access control in Windows SMB allows an attacker to elevate privileges over a network. This patch was revised on the same day as its initial release (and has been revised again for documentation purposes). Windows lifecycle and enforcement updates Microsoft did not release any enforcement updates for June. Each month, the Readiness team analyzes Microsoft’s latest updates and provides technically sound, actionable testing plans. While June’s release includes no stated functional changes, many foundational components across authentication, storage, networking, and user experience have been updated. For this testing guide, we grouped Microsoft’s updates by Windows feature and then accompanied the section with prescriptive test actions and rationale to help prioritize enterprise efforts. Core OS and UI compatibility Microsoft updated several core kernel drivers affecting Windows as a whole. This is a low-level system change and carries a high risk of compatibility and system issues. In addition, core Microsoft print libraries have been included in the update, requiring additional print testing in addition to the following recommendations: Run print operations from 32-bit applications on 64-bit Windows environments. Use different print drivers and configurations (e.g., local, networked). Observe printing from older productivity apps and virtual environments. Remote desktop and network connectivity This update could impact the reliability of remote access while broken DHCP-to-DNS integration can block device onboarding, and NAT misbehavior disrupts VPNs or site-to-site routing configurations. We recommend the following tests be performed: Create and reconnect Remote Desktop (RDP) sessions under varying network conditions. Confirm that DHCP-assigned IP addresses are correctly registered with DNS in AD-integrated environments. Test modifying NAT and routing settings in RRAS configurations and ensure that changes persist across reboots. Filesystem, SMB and storage Updates to the core Windows storage libraries affect nearly every command related to Microsoft Storage Spaces. A minor misalignment here can result in degraded clusters, orphaned volumes, or data loss in a failover scenario. These are high-priority components in modern data center and hybrid cloud infrastructure, with the following storage-related testing recommendations: Access file shares using server names, FQDNs, and IP addresses. Enable and validate encrypted and compressed file-share operations between clients and servers. Run tests that create, open, and read from system log files using various file and storage configurations. Validate core cluster storage management tasks, including creating and managing storage pools, tiers, and volumes. Test disk addition/removal, failover behaviors, and resiliency settings. Run system-level storage diagnostics across active and passive nodes in the cluster. Windows installer and recovery Microsoft delivered another update to the Windows Installer (MSI) application infrastructure. Broken or regressed Installer package MSI handling disrupts app deployment pipelines while putting core business applications at risk. We suggest the following tests for the latest changes to MSI Installer, Windows Recovery and Microsoft’s Virtualization Based Security (VBS): Perform installation, repair, and uninstallation of MSI Installer packages using standard enterprise deployment tools (e.g. Intune). Validate restore point behavior for points older than 60 days under varying virtualization-based security (VBS) settings. Check both client and server behaviors for allowed or blocked restores. We highly recommend prioritizing printer testing this month, then remote desktop deployment testing to ensure your core business applications install and uninstall as expected. Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:  Browsers (Microsoft IE and Edge); Microsoft Windows (both desktop and server); Microsoft Office; Microsoft Exchange and SQL Server;  Microsoft Developer Tools (Visual Studio and .NET); And Adobe (if you get this far). Browsers Microsoft delivered a very minor series of updates to Microsoft Edge. The  browser receives two Chrome patches (CVE-2025-5068 and CVE-2025-5419) where both updates are rated important. These low-profile changes can be added to your standard release calendar. Microsoft Windows Microsoft released five critical patches and (a smaller than usual) 40 patches rated important. This month the five critical Windows patches cover the following desktop and server vulnerabilities: Missing release of memory after effective lifetime in Windows Cryptographic Services (WCS) allows an unauthorized attacker to execute code over a network. Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network. Use of uninitialized resources in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network. Unfortunately, CVE-2025-33073 has been reported as publicly disclosed while CVE-2025-33053 has been reported as exploited. Given these two zero-days, the Readiness recommends a “Patch Now” release schedule for your Windows updates. Microsoft Office Microsoft released five critical updates and a further 13 rated important for Office. The critical patches deal with memory related and “use after free” memory allocation issues affecting the entire platform. Due to the number and severity of these issues, we recommend a “Patch Now” schedule for Office for this Patch Tuesday release. Microsoft Exchange and SQL Server There are no updates for either Microsoft Exchange or SQL Server this month.  Developer tools There were only three low-level updates (product focused and rated important) released, affecting .NET and Visual Studio. Add these updates to your standard developer release schedule. Adobe (and 3rd party updates) Adobe has released (but Microsoft has not co-published) a single update to Adobe Acrobat (APSB25-57). There were two other non-Microsoft updated releases affecting the Chromium platform, which were covered in the Browser section above.
    0 Yorumlar ·0 hisse senetleri ·0 önizleme
  • Hiring Simulation/Graphics Rendering Engineer

    SYNDICATE WORKFORCE SOLUTIONS is partnering with a leading-edge client to identify a Staff Rendering Systems Engineer / Architect in Newark, CA. This opportunity is ideal for a technical visionary ready to lead rendering infrastructure initiatives at the forefront of visual effects, automotive visualization, and simulation technology.
    We are specifically seeking individuals with world-class experience at studios involving high-performance render-intensive environments. If you’ve helped build the rendering backbone behind iconic animated or VFX-heavy productions, we want you on this team.
    About the Role
    The Staff Rendering Systems Engineer will architect and optimize rendering infrastructure for high-performance, scalable operations. You will work cross-functionally with engineering and production teams to enhance pipeline efficiency, implement automation, and solve complex technical issues in rendering workflows. You’ll also provide thought leadership in infrastructure planning and help shape a secure and future-ready rendering technology roadmap.
    Key Responsibilities

    Define and implement architectural strategies for scalable rendering infrastructure and workflows.
    Oversee and optimize Deadline render farm configuration for performance, efficiency, and scalability.
    Automate rendering pipeline tasks using Bash, Python, SQL, and Ruby to improve throughput and reduce manual overhead.
    Lead research and implementation of cloud-based rendering technologies.
    Collaborate with cross-functional teams to troubleshoot rendering issues and ensure system performance.
    Establish and maintain best practices for security, reliability, and system scalability.
    Advise on OS lifecycle management, virtualization, and package management.
    Participate in high-level architectural planning to align with business and technology goals.

    Required Qualifications

    Bachelor’s degree in computer science, Engineering, or equivalent technical field.
    8+ years of hands-on experience managing render farms, preferably within CGI/VFX production environments.
    Strong experience with rendering pipelines and farm management tools such as Deadline.
    Proven expertise in large-scale rendering infrastructure design and maintenance.
    Background working in or supporting large design studios specializing in visual effects, animation, or interactive content production.

    Technical Skills

    Strong knowledge of server hardware, storage systems, and GPU/CPU rendering technologies.
    Fluency in scripting languages.
    Familiarity with virtualization, OS management, and performance optimization.
    Understanding of render farm automation, security principles, and DevOps-style deployment.

    How to Apply
    Submit your resume to Resumes@swfs.ai today and take the next step in your professional journey with SYNDICATE WORKFORCE SOLUTIONS – Empowering Talent. Advancing Technology. Driving Innovation.
    #hiring #simulationgraphics #rendering #engineer
    Hiring Simulation/Graphics Rendering Engineer
    SYNDICATE WORKFORCE SOLUTIONS is partnering with a leading-edge client to identify a Staff Rendering Systems Engineer / Architect in Newark, CA. This opportunity is ideal for a technical visionary ready to lead rendering infrastructure initiatives at the forefront of visual effects, automotive visualization, and simulation technology. We are specifically seeking individuals with world-class experience at studios involving high-performance render-intensive environments. If you’ve helped build the rendering backbone behind iconic animated or VFX-heavy productions, we want you on this team. About the Role The Staff Rendering Systems Engineer will architect and optimize rendering infrastructure for high-performance, scalable operations. You will work cross-functionally with engineering and production teams to enhance pipeline efficiency, implement automation, and solve complex technical issues in rendering workflows. You’ll also provide thought leadership in infrastructure planning and help shape a secure and future-ready rendering technology roadmap. Key Responsibilities Define and implement architectural strategies for scalable rendering infrastructure and workflows. Oversee and optimize Deadline render farm configuration for performance, efficiency, and scalability. Automate rendering pipeline tasks using Bash, Python, SQL, and Ruby to improve throughput and reduce manual overhead. Lead research and implementation of cloud-based rendering technologies. Collaborate with cross-functional teams to troubleshoot rendering issues and ensure system performance. Establish and maintain best practices for security, reliability, and system scalability. Advise on OS lifecycle management, virtualization, and package management. Participate in high-level architectural planning to align with business and technology goals. Required Qualifications Bachelor’s degree in computer science, Engineering, or equivalent technical field. 8+ years of hands-on experience managing render farms, preferably within CGI/VFX production environments. Strong experience with rendering pipelines and farm management tools such as Deadline. Proven expertise in large-scale rendering infrastructure design and maintenance. Background working in or supporting large design studios specializing in visual effects, animation, or interactive content production. Technical Skills Strong knowledge of server hardware, storage systems, and GPU/CPU rendering technologies. Fluency in scripting languages. Familiarity with virtualization, OS management, and performance optimization. Understanding of render farm automation, security principles, and DevOps-style deployment. How to Apply Submit your resume to Resumes@swfs.ai today and take the next step in your professional journey with SYNDICATE WORKFORCE SOLUTIONS – Empowering Talent. Advancing Technology. Driving Innovation. #hiring #simulationgraphics #rendering #engineer
    Hiring Simulation/Graphics Rendering Engineer
    realtimevfx.com
    SYNDICATE WORKFORCE SOLUTIONS is partnering with a leading-edge client to identify a Staff Rendering Systems Engineer / Architect in Newark, CA. This opportunity is ideal for a technical visionary ready to lead rendering infrastructure initiatives at the forefront of visual effects, automotive visualization, and simulation technology. We are specifically seeking individuals with world-class experience at studios involving high-performance render-intensive environments. If you’ve helped build the rendering backbone behind iconic animated or VFX-heavy productions, we want you on this team. About the Role The Staff Rendering Systems Engineer will architect and optimize rendering infrastructure for high-performance, scalable operations. You will work cross-functionally with engineering and production teams to enhance pipeline efficiency, implement automation, and solve complex technical issues in rendering workflows. You’ll also provide thought leadership in infrastructure planning and help shape a secure and future-ready rendering technology roadmap. Key Responsibilities Define and implement architectural strategies for scalable rendering infrastructure and workflows. Oversee and optimize Deadline render farm configuration for performance, efficiency, and scalability. Automate rendering pipeline tasks using Bash, Python, SQL, and Ruby to improve throughput and reduce manual overhead. Lead research and implementation of cloud-based rendering technologies. Collaborate with cross-functional teams to troubleshoot rendering issues and ensure system performance. Establish and maintain best practices for security, reliability, and system scalability. Advise on OS lifecycle management, virtualization, and package management. Participate in high-level architectural planning to align with business and technology goals. Required Qualifications Bachelor’s degree in computer science, Engineering, or equivalent technical field. 8+ years of hands-on experience managing render farms, preferably within CGI/VFX production environments. Strong experience with rendering pipelines and farm management tools such as Deadline. Proven expertise in large-scale rendering infrastructure design and maintenance. Background working in or supporting large design studios specializing in visual effects, animation, or interactive content production. Technical Skills Strong knowledge of server hardware, storage systems, and GPU/CPU rendering technologies. Fluency in scripting languages (Bash, Python, SQL, Ruby). Familiarity with virtualization, OS management, and performance optimization. Understanding of render farm automation, security principles, and DevOps-style deployment. How to Apply Submit your resume to Resumes@swfs.ai today and take the next step in your professional journey with SYNDICATE WORKFORCE SOLUTIONS – Empowering Talent. Advancing Technology. Driving Innovation.
    Like
    Love
    Wow
    Sad
    Angry
    324
    · 0 Yorumlar ·0 hisse senetleri ·0 önizleme
  • You Can Get Windows 11 Pro and Microsoft Office Pro on Sale for Just $55 Right Now

    We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.There’s something to be said for a one-time payment that actually sticks. This bundle on StackSocial pairs Microsoft Office Professional 2021 with Windows 11 Pro for just, and it’s the kind of deal that makes sense if you’re setting up a new PC or finally updating an old one. The Office license is for life—no subscription, no annual fees, and it covers all the essentials, including Word, Excel, PowerPoint, Outlook, OneNote, Publisher, Access, and the free version of Teams. Everything installs locally on one Windows PC, so there’s no hopping between browser tabs or worrying about renewing in 12 months.The Windows 11 Pro license, also included, is the full upgrade, not just cosmetic tweaks but real functionality gains. It’s got advanced tools like BitLocker encryption, Hyper-V virtualization, and Windows Sandbox for anyone dealing with professional-level tasks or sensitive data. If you’re switching from Windows 10 Home, you’ll notice productivity bumps too: snap layouts, tabbed File Explorer, and Copilot baked into the OS. That last one is Microsoft’s AI helper that lives on your taskbar. You can press the Windows key + C to launch it and ask it to summarize web pages, open apps, or adjust settings—all with plain English. There are a few caveats. Note that you’ll need at least 4GB of RAM and 64GB of storage to run it, plus TPM 2.0 and UEFI support, so older PCs may be out. You can only use Office on one PC, and the license is tied to that device, not your Microsoft account, so it doesn’t travel with you if you upgrade to a new computer later. The Windows 11 Pro key gives you a bit more flexibility. And while it’s not compatible with virtual machines or Parallels, the deal still offers solid value for most everyday or professional users looking to avoid recurring costs. Just be sure to activate it within 30 days of buying.
    #you #can #get #windows #pro
    You Can Get Windows 11 Pro and Microsoft Office Pro on Sale for Just $55 Right Now
    We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.There’s something to be said for a one-time payment that actually sticks. This bundle on StackSocial pairs Microsoft Office Professional 2021 with Windows 11 Pro for just, and it’s the kind of deal that makes sense if you’re setting up a new PC or finally updating an old one. The Office license is for life—no subscription, no annual fees, and it covers all the essentials, including Word, Excel, PowerPoint, Outlook, OneNote, Publisher, Access, and the free version of Teams. Everything installs locally on one Windows PC, so there’s no hopping between browser tabs or worrying about renewing in 12 months.The Windows 11 Pro license, also included, is the full upgrade, not just cosmetic tweaks but real functionality gains. It’s got advanced tools like BitLocker encryption, Hyper-V virtualization, and Windows Sandbox for anyone dealing with professional-level tasks or sensitive data. If you’re switching from Windows 10 Home, you’ll notice productivity bumps too: snap layouts, tabbed File Explorer, and Copilot baked into the OS. That last one is Microsoft’s AI helper that lives on your taskbar. You can press the Windows key + C to launch it and ask it to summarize web pages, open apps, or adjust settings—all with plain English. There are a few caveats. Note that you’ll need at least 4GB of RAM and 64GB of storage to run it, plus TPM 2.0 and UEFI support, so older PCs may be out. You can only use Office on one PC, and the license is tied to that device, not your Microsoft account, so it doesn’t travel with you if you upgrade to a new computer later. The Windows 11 Pro key gives you a bit more flexibility. And while it’s not compatible with virtual machines or Parallels, the deal still offers solid value for most everyday or professional users looking to avoid recurring costs. Just be sure to activate it within 30 days of buying. #you #can #get #windows #pro
    You Can Get Windows 11 Pro and Microsoft Office Pro on Sale for Just $55 Right Now
    lifehacker.com
    We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.There’s something to be said for a one-time payment that actually sticks. This bundle on StackSocial pairs Microsoft Office Professional 2021 with Windows 11 Pro for just $54.97 (down from nearly $419), and it’s the kind of deal that makes sense if you’re setting up a new PC or finally updating an old one. The Office license is for life—no subscription, no annual fees, and it covers all the essentials, including Word, Excel, PowerPoint, Outlook, OneNote, Publisher, Access, and the free version of Teams. Everything installs locally on one Windows PC, so there’s no hopping between browser tabs or worrying about renewing in 12 months.The Windows 11 Pro license, also included, is the full upgrade, not just cosmetic tweaks but real functionality gains. It’s got advanced tools like BitLocker encryption, Hyper-V virtualization, and Windows Sandbox for anyone dealing with professional-level tasks or sensitive data. If you’re switching from Windows 10 Home, you’ll notice productivity bumps too: snap layouts, tabbed File Explorer, and Copilot baked into the OS. That last one is Microsoft’s AI helper that lives on your taskbar. You can press the Windows key + C to launch it and ask it to summarize web pages, open apps, or adjust settings—all with plain English. There are a few caveats. Note that you’ll need at least 4GB of RAM and 64GB of storage to run it, plus TPM 2.0 and UEFI support, so older PCs may be out. You can only use Office on one PC, and the license is tied to that device, not your Microsoft account, so it doesn’t travel with you if you upgrade to a new computer later. The Windows 11 Pro key gives you a bit more flexibility (it can be activated on up to two devices). And while it’s not compatible with virtual machines or Parallels, the deal still offers solid value for most everyday or professional users looking to avoid recurring costs. Just be sure to activate it within 30 days of buying.
    0 Yorumlar ·0 hisse senetleri ·0 önizleme
  • What VMware’s licensing crackdown reveals about control and risk 

    Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom. The message is as blunt as it is unsettling: your support contract has expired, and you are to immediately uninstall any updates, patches, or enhancements released since that expiration date. Not only that, but audits could follow, with the possibility of “enhanced damages” for breach of contract.
    This is a sharp escalation in an effort to push perpetual license holders toward VMware’s new subscription-only model. For many, it signals the end of an era where critical infrastructure software could be owned, maintained, and supported on long-term, stable terms.
    Now, even those who bought VMware licenses outright are being told that support access is off the table unless they sign on to the new subscription regime. As a result, enterprises are being forced to make tough decisions about how they manage and support one of the most foundational layers of their IT environments.

    VMware isn’t just another piece of enterprise software. It’s the plumbing. The foundation. The layer everything else runs on top of, which is precisely why many CIOs flinch at the idea of running unsupported. The potential risk is too great. A vulnerability or failure in your virtual infrastructure isn’t the same as a bug in a CRM. It’s a systemic weakness. It touches everything.
    This technical risk is, without question, the biggest barrier to any organization considering support options outside of VMware’s official offering. And it’s a valid concern.  But technical risk isn’t black and white. It varies widely depending on version, deployment model, network architecture, and operational maturity. A tightly managed and stable VMware environment running a mature release with minimal exposure doesn’t carry the same risk profile as an open, multi-tenant deployment on a newer build.

    The prevailing assumption is that support equals security—and that operating unsupported equals exposure. But this relationship is more complex than it appears. In most enterprise environments, security is not determined by whether a patch is available. It’s determined by how well the environment is configured, managed, and monitored.
    Patches are not applied instantly. Risk assessments, integration testing, and change control processes introduce natural delays. And in many cases, security gaps arise not from missing patches but from misconfigurations: exposed management interfaces, weak credentials, overly permissive access. An unpatched environment, properly maintained and reviewed, can be significantly more secure than a patched one with poor hygiene. Support models that focus on proactive security—through vulnerability analysis, environment-specific impact assessments, and mitigation strategies—offer a different but equally valid form of protection. They don’t rely on patch delivery alone. They consider how a vulnerability behaves in the attack chain, whether it’s exploitable, and what compensating controls are available. 

    about VMware security

    Hacking contest exposes VMware security: In what has been described as a historical first, hackers in Berlin have been able to demo successful attacks on the ESXi hypervisor.
    No workaround leads to more pain for VMware users: There are patches for the latest batch of security alerts from Broadcom, but VMware users on perpetual licences may not have access.

    This kind of tailored risk management is especially important now, as vendor support for older VMware versions diminishes. Many reported vulnerabilities relate to newer product components or bundled services, not the core virtualization stack. The perception of rising security risk needs to be balanced against the stability and maturity of the versions in question. In other words, not all unsupported deployments are created equal.

    Some VMware environments—particularly older versions like vSphere 5.x or 6.x—are already beyond the range of vendor patching. In these cases, the transition to unsupported status may be more symbolic than substantive. The risk profile has not meaningfully changed.  Others, particularly organisations operating vSphere 7 or 8 without an active support contract, face a more complex challenge. Some critical security patches remain accessible, depending on severity and version, but the margin of certainty is shrinking.  
    These are the cases where enterprises are increasingly turning to alternative support models to bridge the gap—ensuring continuity, maintaining compliance, and retaining access to skilled technical expertise.

    Third-party support is sometimes seen as a temporary fix—a way to buy time while organizations figure out their long-term plans. And it can serve that purpose well. But increasingly, it’s also being recognized as a strategic choice in its own right: a long-term solution for enterprises that want to maintain operational stability with a reliable support partner while retaining control over their virtualization roadmap.What distinguishes third-party support in this context isn’t just cost control, it’s methodology.  
    Risk is assessed holistically, identifying which vulnerabilities truly matter, what can be addressed through configuration, and when escalation is genuinely required. This approach recognises that most enterprises aren’t chasing bleeding-edge features. They want to run stable, well-understood environments that don’t change unpredictably. Third-party support helps them do exactly that, without being forced into a rapid, costly migration or a subscription contract that may not align with their business needs. 
    Crucially, it enables organisations to move on their own timeline.
    Much of the conversation around unsupported VMware environments focuses on technical risk. But the longer-term threat may be strategic. The end of perpetual licensing, the sharp rise in subscription pricing, and now the legal enforcement of support boundaries all points to a much bigger problem: a loss of control over infrastructure strategy. 
    Vendor-imposed timelines, licensing models, and audit policies are increasingly dictating how organizations use the very software they once owned outright. Third-party support doesn’t eliminate risk—nothing can. But it redistributes and controls it. It gives enterprises more agency over when and how they migrate, how they manage updates, and where they invest. In a landscape shaped by vendor agendas, that independence is increasingly critical. 
    Broadcom’s cease-and-desist letters represent a new phase in the relationship between software vendors and customers—one defined not by collaboration, but by contractual enforcement. And for VMware customers still clinging to the idea of “owning” their infrastructure, it’s a rude awakening: support is no longer optional, and perpetual is no longer forever. Organizations now face three paths: accept the subscription model, attempt a rapid migration to an alternative platform, or find a support model that gives them the stability to decide their future on their own terms. 
    For many, the third option is the only one that balances operational security with strategic flexibility. 
    The question now isn’t whether unsupported infrastructure is risky. The question is whether the greater risk is allowing someone else to dictate what happens next. 
    #what #vmwares #licensing #crackdown #reveals
    What VMware’s licensing crackdown reveals about control and risk 
    Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom. The message is as blunt as it is unsettling: your support contract has expired, and you are to immediately uninstall any updates, patches, or enhancements released since that expiration date. Not only that, but audits could follow, with the possibility of “enhanced damages” for breach of contract. This is a sharp escalation in an effort to push perpetual license holders toward VMware’s new subscription-only model. For many, it signals the end of an era where critical infrastructure software could be owned, maintained, and supported on long-term, stable terms. Now, even those who bought VMware licenses outright are being told that support access is off the table unless they sign on to the new subscription regime. As a result, enterprises are being forced to make tough decisions about how they manage and support one of the most foundational layers of their IT environments. VMware isn’t just another piece of enterprise software. It’s the plumbing. The foundation. The layer everything else runs on top of, which is precisely why many CIOs flinch at the idea of running unsupported. The potential risk is too great. A vulnerability or failure in your virtual infrastructure isn’t the same as a bug in a CRM. It’s a systemic weakness. It touches everything. This technical risk is, without question, the biggest barrier to any organization considering support options outside of VMware’s official offering. And it’s a valid concern.  But technical risk isn’t black and white. It varies widely depending on version, deployment model, network architecture, and operational maturity. A tightly managed and stable VMware environment running a mature release with minimal exposure doesn’t carry the same risk profile as an open, multi-tenant deployment on a newer build. The prevailing assumption is that support equals security—and that operating unsupported equals exposure. But this relationship is more complex than it appears. In most enterprise environments, security is not determined by whether a patch is available. It’s determined by how well the environment is configured, managed, and monitored. Patches are not applied instantly. Risk assessments, integration testing, and change control processes introduce natural delays. And in many cases, security gaps arise not from missing patches but from misconfigurations: exposed management interfaces, weak credentials, overly permissive access. An unpatched environment, properly maintained and reviewed, can be significantly more secure than a patched one with poor hygiene. Support models that focus on proactive security—through vulnerability analysis, environment-specific impact assessments, and mitigation strategies—offer a different but equally valid form of protection. They don’t rely on patch delivery alone. They consider how a vulnerability behaves in the attack chain, whether it’s exploitable, and what compensating controls are available.  about VMware security Hacking contest exposes VMware security: In what has been described as a historical first, hackers in Berlin have been able to demo successful attacks on the ESXi hypervisor. No workaround leads to more pain for VMware users: There are patches for the latest batch of security alerts from Broadcom, but VMware users on perpetual licences may not have access. This kind of tailored risk management is especially important now, as vendor support for older VMware versions diminishes. Many reported vulnerabilities relate to newer product components or bundled services, not the core virtualization stack. The perception of rising security risk needs to be balanced against the stability and maturity of the versions in question. In other words, not all unsupported deployments are created equal. Some VMware environments—particularly older versions like vSphere 5.x or 6.x—are already beyond the range of vendor patching. In these cases, the transition to unsupported status may be more symbolic than substantive. The risk profile has not meaningfully changed.  Others, particularly organisations operating vSphere 7 or 8 without an active support contract, face a more complex challenge. Some critical security patches remain accessible, depending on severity and version, but the margin of certainty is shrinking.   These are the cases where enterprises are increasingly turning to alternative support models to bridge the gap—ensuring continuity, maintaining compliance, and retaining access to skilled technical expertise. Third-party support is sometimes seen as a temporary fix—a way to buy time while organizations figure out their long-term plans. And it can serve that purpose well. But increasingly, it’s also being recognized as a strategic choice in its own right: a long-term solution for enterprises that want to maintain operational stability with a reliable support partner while retaining control over their virtualization roadmap.What distinguishes third-party support in this context isn’t just cost control, it’s methodology.   Risk is assessed holistically, identifying which vulnerabilities truly matter, what can be addressed through configuration, and when escalation is genuinely required. This approach recognises that most enterprises aren’t chasing bleeding-edge features. They want to run stable, well-understood environments that don’t change unpredictably. Third-party support helps them do exactly that, without being forced into a rapid, costly migration or a subscription contract that may not align with their business needs.  Crucially, it enables organisations to move on their own timeline. Much of the conversation around unsupported VMware environments focuses on technical risk. But the longer-term threat may be strategic. The end of perpetual licensing, the sharp rise in subscription pricing, and now the legal enforcement of support boundaries all points to a much bigger problem: a loss of control over infrastructure strategy.  Vendor-imposed timelines, licensing models, and audit policies are increasingly dictating how organizations use the very software they once owned outright. Third-party support doesn’t eliminate risk—nothing can. But it redistributes and controls it. It gives enterprises more agency over when and how they migrate, how they manage updates, and where they invest. In a landscape shaped by vendor agendas, that independence is increasingly critical.  Broadcom’s cease-and-desist letters represent a new phase in the relationship between software vendors and customers—one defined not by collaboration, but by contractual enforcement. And for VMware customers still clinging to the idea of “owning” their infrastructure, it’s a rude awakening: support is no longer optional, and perpetual is no longer forever. Organizations now face three paths: accept the subscription model, attempt a rapid migration to an alternative platform, or find a support model that gives them the stability to decide their future on their own terms.  For many, the third option is the only one that balances operational security with strategic flexibility.  The question now isn’t whether unsupported infrastructure is risky. The question is whether the greater risk is allowing someone else to dictate what happens next.  #what #vmwares #licensing #crackdown #reveals
    What VMware’s licensing crackdown reveals about control and risk 
    www.computerweekly.com
    Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom. The message is as blunt as it is unsettling: your support contract has expired, and you are to immediately uninstall any updates, patches, or enhancements released since that expiration date. Not only that, but audits could follow, with the possibility of “enhanced damages” for breach of contract. This is a sharp escalation in an effort to push perpetual license holders toward VMware’s new subscription-only model. For many, it signals the end of an era where critical infrastructure software could be owned, maintained, and supported on long-term, stable terms. Now, even those who bought VMware licenses outright are being told that support access is off the table unless they sign on to the new subscription regime. As a result, enterprises are being forced to make tough decisions about how they manage and support one of the most foundational layers of their IT environments. VMware isn’t just another piece of enterprise software. It’s the plumbing. The foundation. The layer everything else runs on top of, which is precisely why many CIOs flinch at the idea of running unsupported. The potential risk is too great. A vulnerability or failure in your virtual infrastructure isn’t the same as a bug in a CRM. It’s a systemic weakness. It touches everything. This technical risk is, without question, the biggest barrier to any organization considering support options outside of VMware’s official offering. And it’s a valid concern.  But technical risk isn’t black and white. It varies widely depending on version, deployment model, network architecture, and operational maturity. A tightly managed and stable VMware environment running a mature release with minimal exposure doesn’t carry the same risk profile as an open, multi-tenant deployment on a newer build. The prevailing assumption is that support equals security—and that operating unsupported equals exposure. But this relationship is more complex than it appears. In most enterprise environments, security is not determined by whether a patch is available. It’s determined by how well the environment is configured, managed, and monitored. Patches are not applied instantly. Risk assessments, integration testing, and change control processes introduce natural delays. And in many cases, security gaps arise not from missing patches but from misconfigurations: exposed management interfaces, weak credentials, overly permissive access. An unpatched environment, properly maintained and reviewed, can be significantly more secure than a patched one with poor hygiene. Support models that focus on proactive security—through vulnerability analysis, environment-specific impact assessments, and mitigation strategies—offer a different but equally valid form of protection. They don’t rely on patch delivery alone. They consider how a vulnerability behaves in the attack chain, whether it’s exploitable, and what compensating controls are available.  Read more about VMware security Hacking contest exposes VMware security: In what has been described as a historical first, hackers in Berlin have been able to demo successful attacks on the ESXi hypervisor. No workaround leads to more pain for VMware users: There are patches for the latest batch of security alerts from Broadcom, but VMware users on perpetual licences may not have access. This kind of tailored risk management is especially important now, as vendor support for older VMware versions diminishes. Many reported vulnerabilities relate to newer product components or bundled services, not the core virtualization stack. The perception of rising security risk needs to be balanced against the stability and maturity of the versions in question. In other words, not all unsupported deployments are created equal. Some VMware environments—particularly older versions like vSphere 5.x or 6.x—are already beyond the range of vendor patching. In these cases, the transition to unsupported status may be more symbolic than substantive. The risk profile has not meaningfully changed.  Others, particularly organisations operating vSphere 7 or 8 without an active support contract, face a more complex challenge. Some critical security patches remain accessible, depending on severity and version, but the margin of certainty is shrinking.   These are the cases where enterprises are increasingly turning to alternative support models to bridge the gap—ensuring continuity, maintaining compliance, and retaining access to skilled technical expertise. Third-party support is sometimes seen as a temporary fix—a way to buy time while organizations figure out their long-term plans. And it can serve that purpose well. But increasingly, it’s also being recognized as a strategic choice in its own right: a long-term solution for enterprises that want to maintain operational stability with a reliable support partner while retaining control over their virtualization roadmap.What distinguishes third-party support in this context isn’t just cost control, it’s methodology.   Risk is assessed holistically, identifying which vulnerabilities truly matter, what can be addressed through configuration, and when escalation is genuinely required. This approach recognises that most enterprises aren’t chasing bleeding-edge features. They want to run stable, well-understood environments that don’t change unpredictably. Third-party support helps them do exactly that, without being forced into a rapid, costly migration or a subscription contract that may not align with their business needs.  Crucially, it enables organisations to move on their own timeline. Much of the conversation around unsupported VMware environments focuses on technical risk. But the longer-term threat may be strategic. The end of perpetual licensing, the sharp rise in subscription pricing, and now the legal enforcement of support boundaries all points to a much bigger problem: a loss of control over infrastructure strategy.  Vendor-imposed timelines, licensing models, and audit policies are increasingly dictating how organizations use the very software they once owned outright. Third-party support doesn’t eliminate risk—nothing can. But it redistributes and controls it. It gives enterprises more agency over when and how they migrate, how they manage updates, and where they invest. In a landscape shaped by vendor agendas, that independence is increasingly critical.  Broadcom’s cease-and-desist letters represent a new phase in the relationship between software vendors and customers—one defined not by collaboration, but by contractual enforcement. And for VMware customers still clinging to the idea of “owning” their infrastructure, it’s a rude awakening: support is no longer optional, and perpetual is no longer forever. Organizations now face three paths: accept the subscription model, attempt a rapid migration to an alternative platform, or find a support model that gives them the stability to decide their future on their own terms.  For many, the third option is the only one that balances operational security with strategic flexibility.  The question now isn’t whether unsupported infrastructure is risky. The question is whether the greater risk is allowing someone else to dictate what happens next. 
    0 Yorumlar ·0 hisse senetleri ·0 önizleme
  • Broadcom could face EU antitrust fines over 'punitive' VMware contract terms

    Editor's take: Broadcom aims to convert every valuable customer into a recurring online subscriber. The company has achieved notable financial success with this approach. However, regulators may soon scrutinize its business practices, raising the possibility of costly antitrust fines that could impact its future growth.
    The European Cloud Competition Observatoryis a monitoring group founded by CISPE, a non-profit trade association of European cloud providers. Created as part of CISPE's antitrust settlement with Microsoft, ECCO now has its sights set on Broadcom and its conduct following the acquisition of VMware and its entry into the cloud and virtualization market.
    The observatory recently published a new report following an earlier study of Broadcom's abrupt licensing changes. The findings confirmed the ECCO's previous claims: Broadcom continues to impose harsh, unfair contract terms on European infrastructure providers. Many CISPE members reluctantly accepted the terms, forced by the lack of viable alternatives to VMware.
    The situation has worsened as Broadcom increasingly uses litigation to pressure its partners and customers into signing new agreements. Recently leaked memos reveal the company is sending cease-and-desist letters to VMware perpetual license holders. These letters reportedly demand payment for continued support or face legal consequences.

    Representatives from CISPE held one meeting with Broadcom, but ECCO reports it yielded no progress. The organization highlights a recent formal complaint submitted by VOICE, a German IT association, to the European Commission. VOICE called for an antitrust investigation and more decisive action against Broadcom's harmful practices, with ECCO lending its support.
    The European watchdog group claims Broadcom has done nothing to address complaints from European cloud providers.
    // Related Stories

    "Unlike Microsoft, Broadcom shows no interest in finding solutions or collaborating with European cloud infrastructure providers," CISPE secretary Francisco Mingorance said.
    The company can boast about its new contracts and financial results all it wants, but these punitive conditions will ultimately threaten the viability of the locked-in VMware ecosystem.
    The ECCO welcomed Brussels authorities' formal antitrust investigation and urged Broadcom to take immediate corrective steps. These include restoring fair business practices, introducing transparent pricing, reopening access to partner programs, and protecting customer privacy. While Broadcom is unlikely to comply, a spokesperson said the company seeks a constructive dialogue with CISPE to support European competitiveness.
    #broadcom #could #face #antitrust #fines
    Broadcom could face EU antitrust fines over 'punitive' VMware contract terms
    Editor's take: Broadcom aims to convert every valuable customer into a recurring online subscriber. The company has achieved notable financial success with this approach. However, regulators may soon scrutinize its business practices, raising the possibility of costly antitrust fines that could impact its future growth. The European Cloud Competition Observatoryis a monitoring group founded by CISPE, a non-profit trade association of European cloud providers. Created as part of CISPE's antitrust settlement with Microsoft, ECCO now has its sights set on Broadcom and its conduct following the acquisition of VMware and its entry into the cloud and virtualization market. The observatory recently published a new report following an earlier study of Broadcom's abrupt licensing changes. The findings confirmed the ECCO's previous claims: Broadcom continues to impose harsh, unfair contract terms on European infrastructure providers. Many CISPE members reluctantly accepted the terms, forced by the lack of viable alternatives to VMware. The situation has worsened as Broadcom increasingly uses litigation to pressure its partners and customers into signing new agreements. Recently leaked memos reveal the company is sending cease-and-desist letters to VMware perpetual license holders. These letters reportedly demand payment for continued support or face legal consequences. Representatives from CISPE held one meeting with Broadcom, but ECCO reports it yielded no progress. The organization highlights a recent formal complaint submitted by VOICE, a German IT association, to the European Commission. VOICE called for an antitrust investigation and more decisive action against Broadcom's harmful practices, with ECCO lending its support. The European watchdog group claims Broadcom has done nothing to address complaints from European cloud providers. // Related Stories "Unlike Microsoft, Broadcom shows no interest in finding solutions or collaborating with European cloud infrastructure providers," CISPE secretary Francisco Mingorance said. The company can boast about its new contracts and financial results all it wants, but these punitive conditions will ultimately threaten the viability of the locked-in VMware ecosystem. The ECCO welcomed Brussels authorities' formal antitrust investigation and urged Broadcom to take immediate corrective steps. These include restoring fair business practices, introducing transparent pricing, reopening access to partner programs, and protecting customer privacy. While Broadcom is unlikely to comply, a spokesperson said the company seeks a constructive dialogue with CISPE to support European competitiveness. #broadcom #could #face #antitrust #fines
    Broadcom could face EU antitrust fines over 'punitive' VMware contract terms
    www.techspot.com
    Editor's take: Broadcom aims to convert every valuable customer into a recurring online subscriber. The company has achieved notable financial success with this approach. However, regulators may soon scrutinize its business practices, raising the possibility of costly antitrust fines that could impact its future growth. The European Cloud Competition Observatory (ECCO) is a monitoring group founded by CISPE, a non-profit trade association of European cloud providers. Created as part of CISPE's antitrust settlement with Microsoft, ECCO now has its sights set on Broadcom and its conduct following the acquisition of VMware and its entry into the cloud and virtualization market. The observatory recently published a new report following an earlier study of Broadcom's abrupt licensing changes. The findings confirmed the ECCO's previous claims: Broadcom continues to impose harsh, unfair contract terms on European infrastructure providers. Many CISPE members reluctantly accepted the terms, forced by the lack of viable alternatives to VMware. The situation has worsened as Broadcom increasingly uses litigation to pressure its partners and customers into signing new agreements. Recently leaked memos reveal the company is sending cease-and-desist letters to VMware perpetual license holders. These letters reportedly demand payment for continued support or face legal consequences. Representatives from CISPE held one meeting with Broadcom, but ECCO reports it yielded no progress. The organization highlights a recent formal complaint submitted by VOICE, a German IT association, to the European Commission. VOICE called for an antitrust investigation and more decisive action against Broadcom's harmful practices, with ECCO lending its support. The European watchdog group claims Broadcom has done nothing to address complaints from European cloud providers. // Related Stories "Unlike Microsoft, Broadcom shows no interest in finding solutions or collaborating with European cloud infrastructure providers," CISPE secretary Francisco Mingorance said. The company can boast about its new contracts and financial results all it wants, but these punitive conditions will ultimately threaten the viability of the locked-in VMware ecosystem. The ECCO welcomed Brussels authorities' formal antitrust investigation and urged Broadcom to take immediate corrective steps. These include restoring fair business practices, introducing transparent pricing, reopening access to partner programs, and protecting customer privacy. While Broadcom is unlikely to comply, a spokesperson said the company seeks a constructive dialogue with CISPE to support European competitiveness.
    0 Yorumlar ·0 hisse senetleri ·0 önizleme
CGShares https://cgshares.com