The European Organization for Nuclear Research (CERN) will start using this year 2020 the Kopano email server and stop using Microsoft Exchange. This decision is part of the project promoted by this entity to migrate from proprietary software to Open Source alternatives. Another of the actions in this line is the launch of a new portal that will guide both its software developers and other users to contribute to CERN’s Open Source software projects.
Microsoft is going to release a security patch through Windows Update next March which will disable certain authentication mechanisms via Lightweight Directory Access Protocol (LDAP) in Active Directory (AD), including the one used by UDS Enterprise.
As of that date, UDS Enterprise will only work with authentication via LDAPS (LDAP over SSL). Therefore, all UDS Enterprise administrators using the Microsoft AD authenticator in their VDI and vApp deployments must enable “Secure LDAP” (LDAPS) on their Active Directory server or servers.
We begin the year by unveiling some of the new features that will be incorporated to the next version of our connection broker for desktop and application virtualization. We confirm that UDS Enterprise 3.0 will add support for Hyper-V in cluster.
Now It is possible to deploy Windows and Linux virtual desktops on Windows Server 2019 (Hyper-V) using UDS Enterprise. The developers of the VDI connection broker have been working since Microsoft launched the new version of its hypervisor to provide UDS with compatibility with this technology.
The presentation at RedIRIS Technical Conference where the project of virtualization of computer classrooms at the Public University of Navarre with UDS Enterprise and Nutanix was presented is the post in our blog that got most visits during the past month of June.
Hypervisor platforms developed by Microsoft and VMware are two of the most commonly used proprietary solutions in virtualization projects. If you work in this sector, you surely know them quite well, but do you know exactly what are the differences between Hyper-V and ESXi? In this article we are going to try to analyze them taking as reference the latest version of both software so that you have clear which of these two solutions would be better adapted to the needs of your project.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.