The new manual to install UDS Enterprise Free and Evaluation version, the new features introduced on the VDI connection broker and the official release of oVirt 4.2.0 have been the most read topics in our blog during the last months.
When our computer stops working, the disk is damaged, we suffer a data loss from the main unit or it becomes infected with a virus, we look for a fast and effective solution. Since prevention is better than cure, it is convenient to backup all data in our device to avoid problems.
Red Hat has announced the signing of the definitive agreement to buyCoreOS for 250 million dollars. The acquisition of this technology strengthens Red Hat’s commitment to the Kubernetes container orchestrator and will help streamline container construction, execution and administration tasks in hybrid and multi-cloud environments.
Many users divide the hard drive of their devices into several partitions to separate the system files from their own and thus manage them better and in some cases improve the performance of the system. If this is your case, in this article you will find 5 Open Source GUI based partition managers.
Although Linux is considered the safest operating system, it has recently been proven that it is not always safe from vulnerabilities. Therefore, it is important to adopt security measures that guarantee that the servers and users’ devices are well protected. For this, one of the first steps that should be considered is to protect the file system.
In May of this year 2018 the General Data Protection Regulation (GDPR) will enter into force, which will be mandatory in all countries of the European Union. This new regulation will affect all companies, located in Europe or doing business in the EU, that handle personal information of any kind. Failure to comply with these regulations will be penalized with fines reaching up to 20 million euros.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.