by admin | Mar 13, 2018
Outsourcing is the business practice where a company (say company-X) hires another company (say company-Y), to perform certain tasks. These tasks might have been previously executed by the company-X’s employees itself. IT outsourcing is the use of external parties for...
by admin | Mar 2, 2018
In computing, security threats are possibilities of danger that might exploit a vulnerability to breach security, causing damage. The vulnerability is the weakness which allows an attacker to reduce a system’s information assurance; It occurs due to the presence of a...
by admin | Feb 22, 2018
Cloud Computing is the delivery of on-demand computing resources (computer power, database storage, applications as well as other IT resources) over the internet. This is achieved by using a network of remote servers hosted on the internet rather than a local...
by admin | Feb 10, 2018
Docker is a tool designed to make it easier to create, deploy and run applications using containers. Containers allow a developer to package up an application with all of the parts it needs, such as libraries and other dependencies, and ship it all out as one package....
by admin | Feb 8, 2018
Containers have everything needed to run it – code, run-time, system tools, system libraries, and settings. It’s available for both Windows and Linux based applications. Containers are based on operation-level virtualisation rather than hardware-virtualisation. They...