CVE-2023-4863: High Severity Vulnerability on libwebp
CVE-2023-4863 is a high severity CVE impacting popular open source software, including CentOS 7 and CentOS 8. OpenLogic has published a new patch to address this vulnerability.
Operating Systems, Security
Blog
Beyond CentOS 7 End of Life: The Long-Term Support Outlook
In this blog, our expert gives insight into the long-term outlook for CentOS 7 enterprise support, including community, EOL, and commercial support for CentOS options.
Operating Systems, Open Source
Blog
NGINX Setup and Configuration Tips
Learn how to configure NGINX in this overview of NGINX setup and configuration tips, including NGINX configuration examples.
Web Infrastructure
Blog
Proactive Open Source Lifecycle Management
Explore proactive software lifecycle management for OSS and what OpenLogic experts recommend as best practices.
Open Source, Operating Systems
Blog
What Is AlmaLinux?
In this blog, we take a look at CentOS alternative, AlmaLinux, and discuss the details behind this open source Enterprise Linux project.
Operating Systems, Open Source
Blog
What Is the Cyber Resilience Act?
An overview of the Cyber Resilience Act, its implications, controversy, and impact on open source software and organizations.
Security
Blog
Apache HTTP Server Overview: Features, Use Cases, and Alternatives
Apache HTTP Server is a free, open source, and feature-rich web server that is widely used across the world. Get an overview of Apache HTTP Server features, use cases, and alternatives in this blog.
Web Infrastructure
Blog
Overview of Apache Tomcat
In this blog, we give an overview of Apache Tomcat, how it works, why it's used, it's history, versions, and compare it to alternative web server environments.
Tomcat, Java
Blog
What's New in Apache Kafka 3.5: Features to Watch
Our expert explains what’s new in Kafka 3.5, touching on new and deprecated features, as well as what may be coming in future 3.x releases and what to consider before upgrading.
Apache Kafka
Blog
Unpacking Open Source Compliance
A primer on both common internal compliance requirements for open source software, external OSS compliance regulations, and best practices for maintaining compliance with both.
Security
Blog
When to Choose Kafka vs. Hadoop
In this blog, our expert discusses why teams might select Kafka vs. Hadoop for data management infrastructure as part of their Big Data strategy.
Apache Kafka, Hadoop
Blog
Debunking Open Source Software Security Myths
In this blog, we debunk common myths regarding open source software security, including open source risks in longevity, testing, validation, and enterprise viability.