The European Open Source Observatory (OSOR) team has published a handbook that includes a series of guidelines for creating sustainable Open Source communities in the public sector. Public officials, administrators, project leaders, IT developers and anyone interested in open software will find in this document practical advice to build communities that last over time.
Developers who use the Pyton programming language have an Open Source tool at their fingertips that helps them better understand how their projects work. VizTracer displays and tracks code execution without making any changes to the source code.
One of the strengths of VizTracer is its simplicity. It’s very user-friendly and has no dependencies. Once you use it to track a program, it generates an HTML report that can be opened in Chrome.
Gaspar Rico Falcó, VDI Project Manager at Los Arcos del Mar Menor General University Hospital:
“Thanks to UDS Enterprise we were able to implement a remote working solution urgently for our hospital and for specific groups coordinated by the Murciano Health Service”.
A new side channel attack threatens Intel and AMD CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it PLATYPUS and it allows exploiting variations in processor power consumption to access confidential data. One of the characteristics that differentiate this attack from other similar ones is that it does not require physical access to the server, desktop or laptop.
As you may know, last week we released the new version of our software for desktop, application virtualization and remote access to physical and virtual machines. In the announcement of this release we already revealed the most outstanding new features and functionalities that we have incorporated to UDS Enterprise 3.0
Now we’d like you to have the opportunity to get to know them in a practical way, to see first hand their use in a real VDI environment and learn to make the most out of them. That’s why we have scheduled a webinar for next Thursday, November 19 at 16h CET.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.