Category: Tech

The Linux Kernel: Designed for High Performance Servers (2 of 4)

A simple definition of computer process management is the process by which the software platform, or operating system, allocates computer resources to application and operating system processes. For most applications, system processes are split into two distinct levels: the “kernel level processes” and the “system level processes”. The term “kernel level processes” refers to system… Read more »

Public Cloud: Are You Risking Security?

Cloud computing offers many benefits for businesses and consumers, however, many businesses worry that using the public cloud to store their data could open them up to security risks. Thankfully, the public cloud does not pose the same security risks today as it did in its early years. Let’s take a look at the potential… Read more »

The Linux Kernel: Designed for High Performance Servers (1 of 4)

The Linux kernel features several components at the code and functional level.  The components include the system call interface that provides a communication interface conduit for the process management, memory management, file system, device control (drivers), and networking components. These kernel subsystems provide the means necessary to support essential functions including multitasking, virtual memory implementation,… Read more »

Top 4 Reasons to Move to the Cloud

Everyone talks about moving to the cloud, this magical land of cost savings and technical efficiencies/automation. Yet many people don’t talk about the thing to consider when moving to the cloud and how you realize these gains. Sometimes it is not that easy and it takes some serious changes to your applications or sites if… Read more »

Database Security Essentials for Your Organization

Approaching database security from a holistic and layered perspective is essential to protecting your organization’s valuable information. Database security involves not only the database itself, but also the operating system upon which the database is running, as well as the hardware platform and networks that provide database connectivity. Hence, a database security plan, like most… Read more »

What can VPN connectivity mean to a multi-site organization?

You keep data on your business, employees, and customers. That data is a valuable to more than just you. Corporate espionage costs businesses worldwide over $500 billion a year. Keeping that data safe can be tough even with only one location. So when dealing with multiple sites requiring secure communications, the complexity is magnified. The… Read more »

Why Use Hybrid Cloud for Your Business?

Hybrid Cloud is a term that is tough to escape these days. It means using public cloud services (such as AWS or Azure) and a private cloud together in one combined environment. How can this help your business? Cost.  Public cloud is fast and inexpensive to scale out.   Private cloud is faster, but costs more up front.… Read more »

SHA-1: What it is and How it Affects You

In a fully expected move over 2 years in coming, the major browsers (Google Chrome, Mozilla Firefox, and Microsoft Edge) have announced they no longer support the SHA-1 cryptographic hashing algorithm, often used with SSL certificates. SSL Certificates are the piece in the web puzzle keeping everything secure, encrypting communications between a user and the… Read more »

Solid State Disks Gain Capacity Advantage Over Hard Disks

Until recently one of the factors that hindered the penetration of flash memory-based Solid State Drives (SSDs) into the corporate datacenter was their capacity deficit with respect to Hard Disk Drives (HDDs). Only months ago, at a time when 4TB hard drives were well established as commodity products, 1TB seemed to be the top of the range… Read more »

Data Security: How Companies Lose Data

As much as companies institute data security policies, they still on occasion, find themselves scrambling to recreate their lost data and repairing their reputation over a data loss or breach.  Here are 3 ways in which companies still lose data and what to do to avoid these common pitfalls. Some employees decide to use their advanced settings… Read more »