Use cases with names and surnames always generate significant interest among technology readers. They are the perfect way to learn first-hand how an organization in a specific sector has solved its IT problems with the help of the solutions that exist today in the market. That is why it is not surprising that in the Top 3 of the most read articles on our blog during October; there are two case studies with our UDS Enterprise VDI software.
The ninth European Cybersecurity Month of the European Union (ECSM) is being celebrated this October, whose objective is to promote online security among EU citizens. This cybersecurity awareness campaign is an initiative of the European Union Agency for Cybersecurity (ENISA) and the European Commission, with the support of the Member States.
In the month of September, the news returned with force to all sectors. In technology, desktop virtualization solutions (VDI) have once again been the protagonists since they are closely linked to current news.
The month of September starts and, after the summer break, it is the perfect time to look back and analyze what the interests of our community of users have been during this summer, which for many has come to an end.
Solutions that help manage IT environments with greater efficiency and security while giving organizations the flexibility to maintain a hybrid system that combines on-site work with remote working or distance learning continue to fill the headlines of today’s technology news.
Today opened the virtual event about technological innovation, digital transformation, and Open Source, bringing together more than 2,500 professionals from the IT sector for four days. Chema Alonso, Chief Data Officer (CDO) of Telefónica, has been in charge of kicking off this event that was born eight years ago to accompany experts and organizations in their digital transformation processes. Through lectures, workshops, demos, round tables, interviews … attendees will obtain interesting keys to maximize resources, reduce costs and enhance customer relationships.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.