UDS Enterprise 2.0 under development

UDS Enterprise 2.0 under development

Our development team is already working on UDS Enterprise 2.0. This new version features interesting innovations, such as complete interface and backend redesign, optimized for the new models of services which have been incorporated.

In addition, the new release supports new service providers for cloud and enables calendar management for schedules and tasks. Initially UDS Enterprise 2.0 is planned to be released during 2016 Q2.

Stay tuned to our blog and social media channels to learn more about this new UDS Enterprise release.

5 reasons to dive into VDI in 2016

5 reasons to dive into VDI in 2016

Desktop virtualization is a mature technology which provides huge benefits to companies; above all to those challenging cost control, constant changes and users willing to access information and corporate tools anytime, anywhere and using any device.

Therefore, the beginning of 2016 is the perfect time to consider VDI adoption. Find below five more reasons why this technology may become your best ally:

Linux predictions for 2016

Linux predictions for 2016

Linux has changed a lot in 2015. We have seen, for example, how Microsoft now loves Linux and they have created their own distribution. The first Ubuntu smartphone and the first smartwatch running Tizen have been launched. In the enterprise, Linux has become more powerful with tecnhologies like OpenStack, Docker and Cloud Foundry.

This new year which is about to start is going to bring also great changes for Linux. CIO magazine has published some interesting predictions. You can have a look at them below:

Ethical tech giving guide

Ethical tech giving guide

Have you bought all your Chistmas gifts? If you’re planning to give electronics, the Free Software Foundation (FSF) asks us to give some thought before buying something that could take more than it gives, since it requires, for example, to pay some license in order to use it.

They also advice us to avoid giving products with harsh rules about copying and sharing, or those which perform remote deletion of files without asking users.

Skip to content