Tech giants are lately releasing the code of many solutions. It seems to be an altruist way of helping the Open Source community, but this supposed change of mind could be part of an enterprise strategy.
Such is the case of Google and Microsoft, that are hitting the headlines and social media for open sourcing some of their products.
Our blog is getting more and more visits every day, many users interested in virtualization and Open Source read our posts to be up to date with these topics and with the news related to our sofware UDS Enterprise and our company.
During last weeks, our Trending Topics have been the deployment of virtual desktops with UDS Enterprise and VMware vSphere, our new Certified Partners Program and Kali Linux rolling edition released.
Google has open sourced Seesaw, a Linux-based load balancing system written with Go programming language.
Some time ago, Google used two different load balancing systems, but after registering both management and stability issues, they decided to develop their own solution: Seesaw.
This software enables to “increase service availability and reduce management” overhead, explains Joel Sing, Google Site Reliability Engineer
New vulnerabilities emerge every day, threatening enterprise information security. In order to avoid data and devices getting infected, it is important to find them out early so they can be fixed as soon as possible.
There are Open Source tools which can help to identify vulnerabilities, such as web servers and applications scanners, analysis tools, fuzzers… Below you can find a useful selection:
Nowadays, IT administrators face the challenge of monitoring thousands of users accessing corporate environments at the same time 24×7. These users can be anywhere and they use a wide variety of devices. In this scenario, how can we catch performance issues before they happen?
One of the options is monitoring VDI workloads effectively. If admins know how a virtual dektops environment behaves, they can provide a better experience to end users.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.