UDS Enterprise & Europ Assistance Case Study

UDS Enterprise & Europ Assistance Case Study

UDS Enterprise deployment in Europ Assistance Spain aroused the interest of Relación Cliente Magazine, a reference publication for the Call Center industry. This month’s edition includes a case styudy on this project.

The magazine talks about the IP phone and virtual desktops integration‘s advantages for Europ Assistance workers, which was a custom development built by UDS Enterprise engineers.

Best 2015 Open Source software

Best 2015 Open Source software

Now that 2015 is coming to an end, Tecmint shares the 20 best Open Source software they have found during this year.

SimpleScreenRecorder. You can use it to record audio and video.

Jaspersoft Studio. To create reports with tabs, tables… and export them.

Visual Studio Code. Ir provides a useful programming environment.

TuxGuitar. To edit and play guitar tablatures.

UDS Enterprise, Hyper-V, vSphere & Remote PC

UDS Enterprise, Hyper-V, vSphere & Remote PC

The deployment of virtual desktops with UDS Enterprise & Microsoft Hyper-V, interesting tips to manage VMware vSphere and Remote PC project with UDS Enterprise introduced by the University of Sevilla at RedIRIS Technical Conference 2015 have been the most read topics in our blog during last weeks.

Find below the links to these posts so that you can keep up to date with the most highlighted news on virtualization and Open Source:

Video: UDS Enterprise & Microsoft Hyper-V VDI

How to manage vSphere efficiently

24×7 workplace by UDS Enterprise: How it works

UDS Enterprise supports multiple authentication systems

UDS Enterprise supports multiple authentication systems

One of the most valued features of UDS Enterprise is its great flexibility and easy adaptation to administrators & users’ needs thanks to its Open Source based development model.

Apart from supporting unlimited connection protocols , UDS Enterprise allows the management to desktop services using multiple authentication systems. The system makes it possible to enable or disable one or several authenticators independently.

Skip to content