Subuser uses Docker containers to deliver desktop apps for Linux

Email not displaying correctly? View it in your browser.

InfoWorld Linux Report

Jun 29, 2016
Featured Image

Red Hat builds container security scanning into RHEL

The latest release of Red Hat Enterprise Linux features two directly integrated scanning mechanisms to find and block known vulnerabilities in containerized apps Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Subuser uses Docker containers to deliver desktop apps for Linux
Microsoft Azure makes Docker a first-class citizen
Fedora 24 released with Gnome 3.20 and Flatpak

White Paper: Rogue Wave Software

Four Strategies to Reduce Your Open Source Risk

Open source plays a dominant role in the success of software development teams. Yet few organizations are aware of the risks inherent in the software choices they're making. The four strategies outlined in this white paper will help you understand the importance of establishing an open source management policy so that you can maximize the value of open source software while reducing both technical and legal risks. Read More

Thumbnail Image

Subuser uses Docker containers to deliver desktop apps for Linux

A new open source utility leverages Docker's container technology, using highly granular app permissions to distribute desktop applications Read More

Thumbnail Image

Microsoft Azure makes Docker a first-class citizen

The newest features for containers and microservices in Azure are another step away from the obtrusive toolchains of the Microsoft of old Read More

Thumbnail Image

Fedora 24 released with Gnome 3.20 and Flatpak

Also in today's open source roundup: How to upgrade from Fedora 23 to Fedora 24, and Linux redditors react to the release of Fedora 24 Read More

Video/Webcast: Rogue Wave Software

OSS Has Taken over the Enterprise: The Top Five OSS Trends of 2015

Open source software (OSS) has taken over the enterprise, growing at an incredibly fast rate in mission critical applications. This Webcast examines the impact of open source software by explaining how you can implement usage controls and mitigate risks by discovering OSS in your codebase to eliminate bugs, reduce security vulnerabilities, and ensure license controls. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Linux Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.