After six months of work by 822 contributors who have incorporated 24,571 changes, the new GNOME 4 is now available. The developers have designed a version in which all its elements are simple and easy to use. They have created a manageable and intuitive environment with higher performance, designed to improve the user experience.
Linux is one of the most secure operating systems out there, but that doesn’t mean it’s free from attacks or vulnerabilities. Experts recommend always taking extreme precautions. Therefore, we leave you some tips to properly shield Linux servers in our post today.
One more year, the popular Free Software University Contest has been called. Registrations for the XV edition of this contest will close on Sunday, March 21. University, high school, middle grade, higher grade, and third cycle or master students still have time to present their projects.
Last year all records for cyber threats detected were broken. They exceeded 62.6 billion, a figure that represents an increase of 20% compared to 2019. These data derive from the annual report by Trend Micro, a company specializing in cloud security.
Two Case Studies and a new UDS Enterprise functionality have been the most read articles on our blog during the recently completed month of February. The publication that relates the experience of La Diputación del Común de Canarias with UDS Enterprise takes the cake. This public body has entrusted UDS Enterprise so that all its employees have the freedom to access the programs and applications they need 24×7, from any place and device, facilitating remote working whenever necessary. Among the benefits they have obtained, the centralization of the management of workplaces, which are spread over the seven islands, and the increased security of their data and computer systems stand out.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.