The Linux Kernel: Designed for High Performance Servers (1 of 4)

The Linux kernel features several components at the code and functional level.  The components include the system call interface that provides a communication interface conduit for the process management, memory management, file system, device control (drivers), and networking components. These kernel subsystems provide the means necessary to support essential functions including multitasking, virtual memory implementation,… Read more »

Top 4 Reasons to Move to the Cloud

Everyone talks about moving to the cloud, this magical land of cost savings and technical efficiencies/automation. Yet many people don’t talk about the thing to consider when moving to the cloud and how you realize these gains. Sometimes it is not that easy and it takes some serious changes to your applications or sites if… Read more »

Database Security Essentials for Your Organization

Approaching database security from a holistic and layered perspective is essential to protecting your organization’s valuable information. Database security involves not only the database itself, but also the operating system upon which the database is running, as well as the hardware platform and networks that provide database connectivity. Hence, a database security plan, like most… Read more »

Contegix Welcomes Megan Berkery

Contegix is pleased to announce the addition of Megan Berkery to our Marketing team! Megan joined our St. Louis office this week as our Senior Marketing Specialist and will assist with demand generation programs, branding initiatives and corporate communications.  Welcome, Megan!  It is so great to have you as part of the Contegix family and we… Read more »

Resource Usage and You

When it comes to your IT infrastructure, there are a lot of variables involved in getting things right. Your projected resource usage is one of the more important variables. A critical thing to realize is your need for computing resources will only go up over time. Never down. Higher resource needs tend to coincide with the… Read more »

Hack Prevention and Best Practices

Being hacked has serious implications. The effects are wide-ranging and can cost you a lot of money. The best way to mitigate the impact is by preventing the hack from happening in the first place. Reducing the available attack surface is a great way to accomplish this. Here are a few actions you can take… Read more »

How to Handle a Data Breach

When a breach happens, how you proceed and the actions you take will help mitigate the impact to your bottom line. The type of information stolen generally dictates the seriousness of the entire situation. Back everything up fresh. Treat it like a police crime scene and preserve the evidence. Logfiles, configuration files, and affected data.… Read more »

How to Prevent Data Breaches

The question “How to prevent data breaches?” is similar to ‘how do you prevent car break-ins?’ Cars are still very easy to break into. Their windows are not made of steel. However, you can make the hassle and risk of breaking into the car outweigh their desire to get inside. Keeping money, valuables out of… Read more »

What is Hacking and How it Impacts You

The word “hack” gets used a lot these days and appears to have a few meanings. Every day in the news another organization announces they were hacked. A friend’s twitter account is hacked. Government systems are breached. What does it mean to be hacked? When used in terms of computer security, “Hack” means to gain… Read more »