A few days ago we talked in our blog about a report published by IDC recommending UDS Enterprise connection broker for desktop virtualization projects.
IDC explains in this report entitled Automation and flexible management of the workplace with VDI the benefits of these systems. The consultants believe that the advantages include dynamism and efficiency in deployment, updating and support, the optimization of the workplace resources, the flexibility of multi-device access and the security and availability of applications and data.
Barcelona hosts OpenStack Summit 2016 from today and until next Friday 28th October, a conference for developers, users and administrators of OpenStack Cloud software, the most widely deployed Open Source cloud platform. Those organizations or users planning to deploy a private, hybrid or multi-cloud infrastructure are invited to attend this event to skill up and plan their cloud strategy.
Linux security expert Phil Oester discovered a privilege-escalation critical vulnerability affecting the Linux Kernel. This bug is called Dirty COW and identified as CVE-2016-5195 and although it has recently been discovered, it existed since 2007.
This flaw affects the component Kernel Memory Subsystem, allows to manipulate an unknown input and explote the vulnerability that may affect the system’s confidenciality, integrity and availability.
The wellknown consulting firm IDC recommends in a recently published report the use of our software for VDI. According to the analysts, “UDS Enterprise provides the answer to the management needs of the lifecycle of virtual desktops and the access of remote and local users to desktop virtualization platforms and other remote desktop resources, such as applications“.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.