The versatility of UDS Enterprise allows connection to Linux machines using a wide variety of alternatives, among which are those that incorporate access via HTML5. The broker itself is responsible for automating the deployment of Linux virtual desktops, managing their life cycles at all times.
A user station based on Linux provides many advantages, for example, a greater security, since it is more difficult to attack this operating system through malware and the system complicates the execution of actions or the running of processes that are harmful. If it detects them, it isolates them very quickly thanks to its modular nature.
The UDS Enterprise team analyses in this post the new hyper-converged infrastructures that VMware presented at VMworld 2014, which took place at San Francisco:
With its EVO family, VMware makes a new incursion in the cloud with a solution that scales the resources available for a cloud infrastructure through modules which contain all the resources available (CPU, memory, storage, network…) integrating quickly and efficiently to the management and administration cloud tools, both public and private.
Last week we published a post describing some of UDS Enterprise 1.5 improvements . In this article we explain the remaining new features introduced by the new version of our desktop virtualization connection broker.
Both users and VDI administrators can now set up or disable the root user from the advanced configuration dashboard. In this way, the system can be configured to have root access from the login window.
Our blog’s readers have chosen the new Linux Certification Program, 100% Open Source virtual desktops and UDS Enterprise social media channels as the most interesting posts for the last weeks.
If you dind’t have the chance to read them, find below the link to each article so that you can keep up with the most outstanding news according to our own followers:
They seem similar concepts, but they don’t mean the same. Software-defined networking and network virtualization share some features, such as the objective of improving the agility to direct the right network resources to virtual machines. But their design and architecture are different.
This article outlines the differences and helps to understand the way both technologies work:
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.