Understanding A Very Bad Day on The Internet

As Alexander would say, today has been a Terrible, Horrible, No Good, Very Bad Day for the Internet. You’ve most likely heard about Distributed Denial of Service (DDoS) on the news in relation to a DDoS attack that has taken down a site or service for a period of time.   Fortunately, you’ve probably seldom… Read more »

Hybrid Disk Drives Ease The Transition From HDDs to SSDs


Since its introduction more than a half century ago, the Hard Disk Drive (HDD) has been the king of data storage. For decades this technology provided a combination of high capacity, good performance, and low cost that was unmatched. But now there’s a challenger in the arena, the Solid State Disk (SSD). Why SSD technology is starting… Read more »

5 Tech Tools to Transform Learning

Books with Mouse_sm

With technology’s constant changes, how can a teacher stay current and keep students interested? Here are five tech tools that can be used to create engaging educational content for the new school year. 1. Virtual Reality (VR) Technology When subjects, such as calculus and chemistry, are difficult to understand, students can become easily distracted or… Read more »

Internet Security Basics for Users

Skeletal hands

Sometimes, one of the hardest pieces of ensuring internet security for your business is teaching end users how to maintain security on all of their devices.  So many of them have been lulled into a false sense of comfort.  The internet, to them, is an endless source of information and mindless games.  What’s the worst that can… Read more »

All About Linux

Linux Penguin SIgn

Linux is an operating system that runs on UNIX similarly to Windows for Microsoft or OSX for Apple. It runs on many types of hardware platforms, and its source code is widely used by the public. Essentially, Linux is the sort of operating system users go to when they want to build software platforms from scratch,… Read more »

10 Tips for Writing a Secure Cloud Computing Agreement


There were 736 million records exposed in data breaches in 2015, which was a record all-time high number. One reason enterprises turn to cloud computing services is for much greater security. Cloud services have far fewer vulnerabilities than on-site systems. Even with the added security advantages of the cloud, there is no such thing as too much… Read more »

IBM’s Watson Tone Analyzer: A Fascinating Tool


The IBM Watson Tone Analyzer offers exciting prospects for business and marketing. With this tool, Watson can analyze any text to determine its emotional tone. It looks at each sentence for specific types of language and patterns in order to help writers pinpoint areas in which emotion appears. Then, writers can edit their documents to… Read more »

Contegix Welcomes Doug Anstoetter

Doug Anstoetter

Contegix is pleased to announce the addition of Doug Anstoetter to our team. Doug joined the sales team today as our newest Account Executive.

Relational Databases

Managed Public Cloud

The old idea of a database has come a long way. The first database structures, database management systems (DBMSs), were based on a filing cabinet paradigm, with data largely stored on magnetic media. Relationship databases including TM/1 (standing for “Table Manager”) is based on a multi-dimensional spreadsheet model where data is stored in memory or rapid-access media.  Data arranged in virtual cubes enabled structured queries that can… Read more »

Virtual Appointments: The Future of Healthcare


Doctor’s appointments for most people are dreaded inconveniences that interrupt their daily routines. Whether they must leave work in the middle of the day or secure a babysitter for a few hours, often times they are more of a hassle than anything else. It is likely that the inconvenient nature of doctors’ appointments are part… Read more »