Amazon Web Services (AWS) has become commonplace as the backbone of many businesses’ infrastructure and offers a variety of uses, including being a means for acquiring big data computing and software development. Enterprises and developers can use AWS to create, deploy, run, maintain, and keep track of applications in the cloud. This public cloud computing… Read more »
It seems like everyone is talking about hybrid cloud, a mixture of public, private and/or on premise clouds (in its simplest form). But why do we hear that phrase so much? Is it all that it’s cracked up to be? In a word, YES. If constructed and implemented correctly, hybrid cloud can provide numerous advantages… Read more »
A simple definition of computer process management is the process by which the software platform, or operating system, allocates computer resources to application and operating system processes. For most applications, system processes are split into two distinct levels: the “kernel level processes” and the “system level processes”. The term “kernel level processes” refers to system… Read more »
You don’t want to be a casualty of any ransomware threat, including WannaCry. This cyberattack hit over 300,000 computers in 150 countries. Most of the victims were in Asia, although systems in Europe and the United States were also affected. Consider yourself lucky if you did not boot up to a screen that demanded a $300… Read more »
Cloud computing offers many benefits for businesses and consumers, however, many businesses worry that using the public cloud to store their data could open them up to security risks. Thankfully, the public cloud does not pose the same security risks today as it did in its early years. Let’s take a look at the potential… Read more »
Contegix is pleased to announce the addition of Owen Walker to our team. Owen joined the support team as an Engineer and began his new role today.
Contegix is pleased to announce the addition of Adam Glover to our team. Adam joined the support team last week as our newest Engineer.
The Linux kernel features several components at the code and functional level. The components include the system call interface that provides a communication interface conduit for the process management, memory management, file system, device control (drivers), and networking components. These kernel subsystems provide the means necessary to support essential functions including multitasking, virtual memory implementation,… Read more »
Everyone talks about moving to the cloud, this magical land of cost savings and technical efficiencies/automation. Yet many people don’t talk about the thing to consider when moving to the cloud and how you realize these gains. Sometimes it is not that easy and it takes some serious changes to your applications or sites if… Read more »
Approaching database security from a holistic and layered perspective is essential to protecting your organization’s valuable information. Database security involves not only the database itself, but also the operating system upon which the database is running, as well as the hardware platform and networks that provide database connectivity. Hence, a database security plan, like most… Read more »