Creating iSCSI SAN Storage on Linux (CentOS 7.0)

By |March 31st, 2015

Learn how to create SAN Storage on Linux CentOS 7.0. Enjoy our new Tech Crew Video Series!

Cloud Computing: Public vs. Private vs. Hybrid

By |November 4th, 2014

Have you ever wondered what distinguishes the different variations of cloud computing? This intuitive video provides a nice distinction among the three.

Intel Xeon E7-4850 Enterprise Dedicated Server

By |October 21st, 2014

EX 7000 with Intel Xeon E7-4850
Assembling and maintaining world-class IT operations in-house with certain reliability is a considerable, but necessary expense for a variety corporate outfits. Whether your users are in the millions or budget exceeds six figures, we’d like to figure any viable percentage savings in this regard should be considered.

With CalPOP’s complimentary support and the awe-inspiring capacity of the EX7000 Enterprise Dedicated Server enterprise-grade dedicated server, your company is capable of relocating, if not upgrading, its IT operations while cutting costs substantially.  Built with dual Intel Xeon E7-4850 processors this […]

Securing Your Web Server

By |May 13th, 2014

In March 2014, South Korean telecom major, KT Corp suffered a major cyber-attack in which, reportedly, personal information of 12 million customers was put at risk. Around the same time, the North Dakota University System alerted over 290,000 students and alumni as well as some faculty members that their personal details including social security numbers might have been compromised following an attack on one of their servers. These and other serious server breaches in the very recent past have revealed major weaknesses in server –level security. Threats currently appear […]

Benefits and Possible Drawbacks of Cloud-based Server Monitoring Systems

By |May 8th, 2014

With more and more businesses looking to increase efficiencies through virtualization, server monitoring has acquired a critical role. Appropriate deployment of the right server monitoring solution can deliver efficient resource allocation and optimum database and application performance, thereby increasing business productivity and enhancing competitive ability.
Companies implement virtualization in order to reduce the cost of investing in physical servers, to save time as well as to cut down on energy expenses and cooling costs. One stands to capitalize on virtualization only if one can maximize server uptime and allocate resources […]

Network Security – The Importance of Securing Third Party Access

By |May 6th, 2014

Though a data breach is one of the biggest fears facing IT security managers today, the frequency with which data thefts including some relatively unsophisticated and easily preventable ones are taking place demonstrate the lapses in implementing multi-layered security measures.  Given the rapid technological advances in infiltration methods, it’s unrealistic to expect any organization to have a totally fail-safe barrier against cyber-attacks, but it’s crucial that they focus on securing the network using a robust combination of network knowledge, advanced detection tools and reactive measures.

One of the most glaring […]

Choosing SSL Certificates

By |May 3rd, 2014

If you operate an ecommerce website or one that stores confidential or sensitive information, you’ll probably want to pay extra attention to the way you protect your users.  In most cases, that includes applying a Secure Socket Layer Certificate (a.k.a. SSL cert or even just “cert”) to encrypt the data as it travels between systems and to provide visual cues to your users that you’re taking steps to protect their data.

In this post, I’ll discuss the types of SSL certificates and why you would choose one over another.

All SSL […]

The Importance of Network Monitoring

By |May 1st, 2014

With threats evolving rapidly, networks are more vulnerable than ever today. In order to prevent network intrusions and data compromises, network security managers need to combine network knowledge with advanced detection and response technologies to protect their systems and customers’ data. Because hackers are increasingly launching multi-pronged attacks on networked systems, constant monitoring of network activity at all levels is crucial to pre-empting and confronting blended threats.
Unlike the single-vector attacks of the past such as infiltrating systems through an email or a pop-up window, today’s intrusions are engineered to […]

Hybrid Cloud Foils Mythic Fears of Cloud Computing

By |April 29th, 2014

Hybrid Cloud

Cloud computing has moved well beyond the hype wave and emerged as the key enabler of business innovation in recent years. Yet, industry laggards are struggling to navigate the risky skies of cloud computing and still consider the $50 billion technology industry as the “future arrived too early”. Fortunately for businesses looking to leverage the promising enterprise technology, cloud computing isn’t an all-or-none proposition. A hybrid strategy creating a middle ground between economic savings and scalability of the public cloud, and security protection and agility of the private […]

Choosing an Appropriate Linux Server

By |April 24th, 2014

Though Linux is more commonly used as a desktop operating system than in the server space, there are more than a few Linux server options available. The choice of a Linux server depends on the user’s needs and one’s level of expertise with Linux. Today, Linux servers are deployed by small businesses, corporates and even stock exchanges.

Some general characteristics that users across the spectrum look for are stability over the long term, ease-of-use, security, hardware flexibility and scalability, commercial support as well as relatively reasonable ownership costs. Reliable and […]