BLOG

Linux Server Auditing

  A server is a computer hardware or program which provides services to another computer hardware or program, known as the client (and in turn, to its users). Mostly server and client will reside in separate computing systems or hardware (in which case it can be on similar computing system),...

read more

Managing Increased Security Threats

  Information technology is getting updated fast, which is revolutionizing every walk of life. Along with these technological advancements, security threats are also increasing in the arena of cyber world. Newer technologies have opened newer ways for threats. Let’s have a look at newer...

read more

Buzzword Talk – ‘Machine Learning’

  We hear the term Machine Learning so often. It has been immensely popular in the cyber world today. Machine learning is the technology which can make computers work without being explicitly programmed. It enables learning ability in information systems/ computers. As per Dr. Yoshua Bengio,...

read more

Data Centers – an overview

Data centers are technical facilities composed of networked computers and storages that are used by organizations to store, manage, disseminate and process large amounts of data. Data centers house even the most critical systems which are extremely vital for business continuity and operations,...

read more

Buzzword Talk – ‘Internet of Things’ (IoT)

Let’s talk about ‘Internet of Things’ (IoT) today. Term IoT has been coined by Kevin Ashton, a British technology pioneer. We can have a clear understanding of IoT through this quote by Ashton, from one of his published articles: "If we had computers that knew everything there was to know about...

read more

Checklists for Outsourcing Technical Support

Outsourcing is the business practice where a company (say company-X) hires another company (say company-Y), to perform certain tasks. These tasks might have been previously executed by the company-X’s employees itself. IT outsourcing is the use of external parties for effective delivery of...

read more

Security Threats

In computing, security threats are possibilities of danger that might exploit a vulnerability to breach security, causing damage. The vulnerability is the weakness which allows an attacker to reduce a system’s information assurance; It occurs due to the presence of a system flaw, attacker’s...

read more

AWS vs Azure vs Google vs IBM Cloud, which is the best for me?

Cloud Computing is the delivery of on-demand computing resources (computer power, database storage, applications as well as other IT resources) over the internet. This is achieved by using a network of remote servers hosted on the internet rather than a local server/personal computer. A cloud...

read more

Docker

Docker is a tool designed to make it easier to create, deploy and run applications using containers. Containers allow a developer to package up an application with all of the parts it needs, such as libraries and other dependencies, and ship it all out as one package. The application will run on...

read more