Category: Tech

DevOps Part 2: Public Cloud and DevOps Tools Go Hand in Hand

In our previous post, we addressed the confusion that many people have about DevOps.  It’s more than just putting together two critical teams in your IT organization.  DevOps are tools that facilitate collaboration and communication between your development and operations teams, and automate the process of software delivery and infrastructure changes.  You can avoid human… Read more »

DevOps Part 1: It’s More Than Teams

DevOps:  yet another buzzword everyone seems to be throwing around lately.  Just like any buzzword, there are many vague definitions, leaving people confused about what it really means. For example, you may be thinking, “My Development and Operations teams are working together, that’s DevOps.”  Not really. If you are thinking it is a people term,… Read more »

The Linux Kernel: Designed for High Performance Servers (3 of 4)

A critical component of all computer operating systems is memory management.  This component is also an integral piece of the Linux computer architecture that enables allocation of the physical memory available between multiple processes. Memory management structures and algorithms in different operating systems (such as Windows and Linux) have much in common (for example, facilitating… Read more »

The Linux Kernel: Designed for High Performance Servers (2 of 4)

A simple definition of computer process management is the process by which the software platform, or operating system, allocates computer resources to application and operating system processes. For most applications, system processes are split into two distinct levels: the “kernel level processes” and the “system level processes”. The term “kernel level processes” refers to system… Read more »

Public Cloud: Are You Risking Security?

Cloud computing offers many benefits for businesses and consumers, however, many businesses worry that using the public cloud to store their data could open them up to security risks. Thankfully, the public cloud does not pose the same security risks today as it did in its early years. Let’s take a look at the potential… Read more »

The Linux Kernel: Designed for High Performance Servers (1 of 4)

The Linux kernel features several components at the code and functional level.  The components include the system call interface that provides a communication interface conduit for the process management, memory management, file system, device control (drivers), and networking components. These kernel subsystems provide the means necessary to support essential functions including multitasking, virtual memory implementation,… Read more »

Top 4 Reasons to Move to the Cloud

Everyone talks about moving to the cloud, this magical land of cost savings and technical efficiencies/automation. Yet many people don’t talk about the thing to consider when moving to the cloud and how you realize these gains. Sometimes it is not that easy and it takes some serious changes to your applications or sites if… Read more »

Database Security Essentials for Your Organization

Approaching database security from a holistic and layered perspective is essential to protecting your organization’s valuable information. Database security involves not only the database itself, but also the operating system upon which the database is running, as well as the hardware platform and networks that provide database connectivity. Hence, a database security plan, like most… Read more »

What can VPN connectivity mean to a multi-site organization?

You keep data on your business, employees, and customers. That data is a valuable to more than just you. Corporate espionage costs businesses worldwide over $500 billion a year. Keeping that data safe can be tough even with only one location. So when dealing with multiple sites requiring secure communications, the complexity is magnified. The… Read more »