How to backup cloud servers? Find it out here

Since cloud computing became popular, backing up a server has ceased to be a two-stage analog process to become a complex series of steps executed by software specialized in cloud servers back up.
But what are the main differences between supporting a physical server and a virtual one? In this article, we will cover this topic together with a review about the vendors that offer applications to perform an effective backup of your virtual server.

Continue reading

Top 10 best websites to explore in the Deep Web

The Deep Web together with the Dark Web may seem like a scary place to go in. But legends about the Deep Web have awakened the curiosity of many people interested in the content that these non-indexed websites can offer, especially if they are not visible for search engines like Google, Yahoo, Bing, etc.
Although it is known that many Dark Web sites are owned by cyber pirates who promote illegal content, it is possible to find very interesting sites in the Deep Web with legal content that you will hardly find available in the Clearnet. Take a look at some of the best Deep Web websites to start your journey.

Continue reading

The future of augmented reality technology will be in the cloud

Do you remember the furor caused by the game Pokemon Go? That was one of the first massive experiences of contact with augmented reality technology that the world had experienced. Beyond the Pokemon Go madness, what it showed us was, in some way, what our interaction with the internet of things will look like in the near future.
Imagine being able to get information in real time about everything you see in your house, on the street or even in the supermarket through your mobile phone or your glasses. This will be possible thanks to the storage of an interactive 3D map of reality in the cloud. In other words, the definitive fusion between the real and the virtual world.
Although there are applications for mobile phones that use augmented reality, including the famous smart glasses that Google launched to the market without much success, the promise of full integration between the physical and virtual world is about to arrive and many consider it the next great technological revolution.
It is no coincidence that giants such as Apple, Alphabet, and Amazon among others, are putting all their effort to be leaders of this next technological boom.

Continue reading

Get to know Shodan, the scariest Search Engine on the Internet

Can you imagine a search engine unleashing a cybernetic apocalypse through a simple online search? Shodan can do it. Shodan is considered one of the most dangerous search engines. Although is not easy to use for most Internet users, experts in cybersecurity and hackers can work with it.
To give you an idea of ​​the chaos that Shodan is capable of, imagine what would happen if all traffic lights in your city lost their synchronicity and went crazy. Fatal accidents may occur in seconds! That was just a small example of what Shodan could do in the wrong hands. Scary? Discover what Shodan is and how it works.

Continue reading

How to secure your server: 5 tips for the best server protection

Security is one of the most important aspects of a server. Weak protection measures can open the way for attackers to gain unauthorized access to your server. And today, cybercriminals are more aggressive than ever. Let us help you with these tips focused on the basic steps to get a good server protection.

Continue reading

Facebook stress: the social network controls you through dopamine

With more than 125 million user connections created since 2004, two million likes a day and one billion comments, Facebook continues to be the most influential and attractive social network for Internet users. But what makes us so attached to Facebook every day looking at its content? The answer is: dopamine.
Checking Facebook when waking up and before sleeping has become part of the daily ritual of many people around the world. Also giving likes, writting comments and sharing content has been added to the dynamics of social interaction.

Continue reading

What is Cyber Blitzkrieg and why is it important to avoid it

The soldiers have abandoned the tanks and are going behind the computers ready to launch a fulminating attack that finishes with the enemy in minutes. Entire nations could lose their infrastructure and be in chaos in a few hours. This is not science fiction, this is the Cyber Blitzkrieg.

Continue reading

The most interesting IT conferences before the end of the year

Every IT expert knows that to stay in tune with technology, it is necessary to be aware of the new trends and technological developments in the world and one of the best ways to keep updated and fresh is attending technological conventions.
These events are an excellent opportunity to get feedback through conferences, exhibitions, and workshops related to information technology.
Tech summits are also a good way to contact colleagues around the world and find cooperation opportunities. Take a look at the current technological events that are waiting for you.

Continue reading

IP address: how does it work and five tools to browse anonymously

Did you ever notice how important your IP address is? Just as your telephone number or your house address, the IP address shows your location as soon as you start browsing. Without the IP address, your internet connection would be impossible. On the other hand, it can make you vulnerable to different web threats as well. Learn how your IP address works and how to protect your privacy while browsing.

Continue reading

Dedicated Server or Managed Server? What you need to consider to choose one of them

Thinking about the best place to host your website or maybe you need to expand the capacity of your private network and storage resources? You will have to decide between a dedicated server or a managed one. But do you know what the differences between the two of them are? Find out and make the right choice. 

Continue reading

How to start using OpenStack

Maybe OpenStack is not the easiest computational technology to understand. Also, we can´t assume that all those interested in OpenStack have experience working with virtualization. However, in this introduction to OpenStack, we will try to explain in a simple way how the basic OpenStack architecture works and the current possibilities on how to start using it. 

Continue reading

What did these guys to be considered the most lethal and famous hackers in history

For some people, hackers are pirates who must be imprisoned. For others, they are rebels with brilliant minds capable of deciphering the most complex computer riddles.

The Hacker world has always been in the spotlight of the controversy and it is not surprising. Some of them have managed to violate the intelligence systems of the most powerful countries and access their secret databases.

Discover who have been the most famous and lethal hackers in history and what they have done to deserve this title.

Continue reading

Get to know Ray Kurzweil, the prophet of the digital era

The times when prophets led entire nations through divine predictions have changed. Today, the new prophets guide us not by divine inspiration but through technology. A clear example of a modern prophet is Ray Kurzweil, the man who´s predictions have an incredible 86% accuracy rate. Get to know what the future will look like according to this technological guru!

Continue reading

Darkness for dummies: differences between the Dark web and the Deep web

What are the differences between the Dark web and Deep web? If we compare the Internet to a city, we can distinguish different zones clearly. Just like a city, the Internet has secure zones and risky zones, fancy neighborhoods where you would like to live in and those areas where it´s better to not stop at night. Here we´ll explain to you how to distinguish between the visible and invisible Internet zones to surf safely.

Continue reading

Best music for programmers: increase your concentration and get the code done

Do you have a deadline and need to focus more than ever on those lines of code but your brain is on vacation in Thailand? Maybe you need some audio therapy to recover your concentration and get the job done as soon as possible. Try the best music for programmers based on scientific studies. Avoid distractions and improve your mental performance with these audio tools.

Continue reading

Methods and strategies to set up the right data

Data loss can destroy a company in a few seconds in different ways: hacking, a fire, intentional and unintentional deleted information, etc. That’s why data backup should be considered much more than a simple practice, but a culture of prevention for companies and individuals. Let's see what is behind every backup method to design a good data protection strategy.

Continue reading

Why is Nanotechnology a way to play God?

Can you imagine nanorobots in your brain providing a complete immersion of virtual reality and connecting your neocortex to the cloud to expand it? Well, this can happen in 2030 if nanotechnology continues to evolve so fast.

Your brain connected to the Internet could update your intelligence and memory capacity instantly, but how smart is it to do this? Is it worth being so integrated with technology? Could you live by reading the mind and feelings of another person through brain-to-brain communication? Will we still be human beings if our mistakes are deleted by nanotechnology? When is it too much? Let's look at what the future holds for us.

Continue reading

Quantum computer might change the world in the next five years

Nowadays, the use of a quantum computer remains, almost, as an exclusive practice of technological research laboratories, but according to IBM, in five years this technology will be mainstream because it will be more accessible to professionals from different areas and developers all around the world. This will provide the possibility to solve complex problems that current computers are not able to do.

Surely the quantum will be a subject of recurrent study in the classrooms of universities and high schools very soon, but the fact is that many of us still do not know what this technology is about and why it´s so exciting for the scientific community.

Let's see what are the basics of this technology are and what we can expect from it in our lives soon.

Continue reading

Malware protection: common threats and five effective removal tools

Malicious software (aka Malware) compares to any human disease. Our digital life is always exposed but chances can be minor with prevention. Malware has several mutations that affect computers and devices depending of the magnitude of each attack. 360,000 new Malware is detected every day. Although internet security companies work harder than ever to eradicate the most significant ones, users are essential to stop the spread of malicious software worldwide. The key? Information. Check out what malicious software is about, the most common types, and what to do to remove it from your system.

Continue reading

Increase your Wifi security using these algorithms

Sometimes, routers have unsafe configurations that make them susceptible to malware attacks. For instance, there are security failures in the operating system, the firmware, the security algorithm and the web applications of routers. Attackers can use these vulnerabilities as entry points to compromise your network. In fact, there are some tools and websites that cybercriminals use to find vulnerable routers and get exploits for their attacks. Learn to identify if your encryption algorithm is working to protect you from intruders.

Continue reading

Cloud technology in cars can save your life and make it more enjoyable

Can you imagine you could unlock your car only by using your smartphone? Would you appreciate getting an alert from your car on an icy or slippery road? No matter how vivid your imagination is, it is very likely this situation is not from a very far future. Nowadays, automakers cooperate intensively with software developers to connect cars with cloud technology in order to increase the safety and comfort of driving.

Continue reading

Beginner´s guide to mining Bitcoins: How to mine Bitcoin step by step

Are you interested in mining Bitcoins but don´t know much about cryptocurrencies? Then you may welcome our detailed manual for beginners that will tell you how to mine Bitcoin step by step. If you want to learn more about the principles behind mining and how Bitcoin mining works, read our article Bitcoin mining in theory: what is the principle of mining?

Continue reading

Bitcoin mining in theory: what is the principle of mining?

A very careful user - in a gas mask.

There is a reason why bitcoin mining got just this naming. Solving mathematical problems in order to find Bitcoins is really similar to mining gold. Just like gold lies under the ground for a long time before it gets mined, Bitcoins also exist in a protocol's design and wait to be discovered. How exactly does Bitcoin mining work? How many Bitcoins are there and how many of them still remain unmined? Find all the answers in this article.

Continue reading

Malware in ads causes trouble for millions of people. But ad publishers still fight against ad blocking

A very careful user - in a gas mask.

Maybe you know a person like this. He or she will adamantly claim that they have never been to any suspicious or dangerous websites, have never opened an email attachment as long as they live and have never downloaded anything.

And yet they have a computer haunted by malware.

However, the time has come for exactly this to be possible. Even people who try to surf the net responsibly and safely can have their computers infected by a nasty malware.

Because of ads that spew the malicious code around.

Continue reading

Hackers are learning from mafia. They extort a “protection” fee under a threat of DDoS attacks

A picture of a mafioso sitting behind a table, using his phone to extort someone.

“What a lovely thing, that company network of yours, with all its servers and websites. It would be a shame if anything were to happen to it…”

Acting like old-school mafia, a group of hackers calling itself the Armada Collective started to extort money from companies.

They rattle their sabres and threaten companies with a massive DDoS attack, unless the firms in question pay a hefty sum in bitcoin.

Situations like these happen quite frequently. However, this particular case is unique – in the end, the Armada Collective doesn’t attack at all. All those threats turn out to be empty.

Even so, the “hackers” racked up a lot hundreds of thousands of dollars from many companies.

Continue reading

Watch out for security cameras, warn experts. Research found holes in security

Security cameras. Experts think they are not secure at all.

Experts on internet security had some suspicions, so they put them to the test. They thought that security cameras might be actually inviting hackers into networks of companies they tried to protect. But how many attackers would actually employ these when searching for a way in?

They did a practical test. Five routers, DVR systems and IP cameras were set up and connected to the internet. Every device was fully patched and ran on default settings.

How did they fare in the test?

Continue reading

Scientists built a new quantum computer. It’s made of five atoms and “self-destroys” after each use

A vizualization of a molecule. Scientists managed another breakthrough. Their new quantum computer can do lightning-fast calculations despite consisting of only five atoms.

Experts on quantum computing have broken through another barrier on the way to quantum computers we could actually use.

A team of scientists from Innsbruck university and MIT managed to build a functional quantum computer that is the first to successfully scale the famous Shor algorithm for quantum computers.

Their newest pride and joy is only five atoms large and needs to be rebuilt after every use. However, the scientists claim that it is easily scalable – so an effort to build a larger and more complex quantum computer is no longer a question of taming the physics, but of a budget.

Continue reading

The fastest computer in Europe will get a sizeable upgrade: 4500 new GPUs and faster CPUs to boot

A photo of the Piz Daint supercomputer at the swiss supercomputing center CSCS. It will soon get even faster. Photo copyright: CSCS.

The fastest computer on the old continent can look forward to getting a huge present.

The Piz Daint supercomputer at the Swiss National Supercomputing Center (better known under its Italian acronym CSCS) will get a proper upgrade.

What will the experts at CSCS change under the hood?

Continue reading

SSL certificates explained: What SSL is, how it works and why you should use it as well

“We want a safer internet!” think lots of people all over the world.

And experts are working on just this day and night. However, results of their hard work are often so difficult to understand that only security experts themselves know what has been accomplished.

This is the case with SSL certificates. While IT experts know what SSL is, how it helps with securing the internet and all that jazz, most people have only partial – and often wrong – information. And although news outlets try, they only succeed in passing on very basic information – like “check if your browser says HTTPS and look for a lock icon, then you’re safe” kind of thing.

But there’s more to it than that.

Because SSL certificates are a complex and powerful system that makes the internet safer.

Continue reading

Moore’s law grew the IT business for 51 years. But today’s anniversary might be its last

Fifty-one years ago to the day, the director of Fairchild Semiconductors’ R&D laboratories wrote an interesting paper.

He described the evolution of computer chips since the 1950s.

In a short text – mere three and a half pages long – he described his findings. He noticed that the transistor count of reasonably priced circuits is growing at a quick pace. The chart of transistor count growth for the last few years was practically a steady upwards line. The complexity of similarly priced circuits almost doubled every year.

As a proper scientist, the director thought ahead. What could this mean for the future? “Over the longer term, the rate of increase is a bit more uncertain, although there is no reason to believe it will not remain nearly constant for at least 10 years,” the thirty-six years old researcher wrote.

His name was Gordon Earle Moore and he just gave the world his “law” that dictated the pace of the whole IT industry for over half a century.

Continue reading

Dell brought out a honey-filled trap for hackers. It lures them with fake credentials

A hacker combing through a company network stumbles on a lucky find – the memory of one of the servers holds login credentials of an administrator.

And already he’s made a mistake. The trap has sprung.

The hacker tried to take hold of fake credentials that were intentionally left there by the server’s defenders. They will help them to better monitor and identify further attacks.

That’s how a new tool called DCEPT made by Dell’s experts should work. It should make life easier for admins and more difficult for hackers. And best of all, the DCEPT is free and open source.

Continue reading

MouseJack: Security experts found a way to hack any computer through its mouse

There’s a new way for hackers to get control over a computer and it’s surprisingly simple.

They can just take control of their target’s mouse.

Security experts found a fault that allows a hacker to hijack a computer through a wireless mouse of their victim with just a cheap USB dongle and few lines of code in Python.

They dubbed the attack MouseJack and consider it a real threat for individuals and companies alike.

Continue reading

Scientists created a new type of CPU that communicates using light instead of electrons

Unexpected miracle.

This nickname and many like it have been quickly ascribed to a new kind of CPU that has been created by a group of scientists from three US universities.

Their research published by Nature came out unexpectedly. Even though it promises huge changes in the future development of processors.

What is it all about, then? It’s a CPU that uses both photons and electrons, amazingly fast when moving data around, and it’s been built the same way that current chips are.

Continue reading

Catch old viruses: The Internet Archive adds a museum of DOS malware

Would you like to try out a virus?

You probably don't hear an offer like this a lot. But now it's time to seriously think about it - as a newly established Malware museum offers just that. It's a collection of old viruses, worms and other malicious software hailing from the long-passed ages of DOS and it allows visitors to experience their effect firsthand, right in the browser.

But there's no need to be afraid of potential data loss or system corruption. Every bit of malicious code has been cut out from the malware, so you can experience its behaviour without destructive consequences.

Continue reading

How to Build a Company Data Center: Part Three

In the previous article of this series, we furnished a data center with network technologies. But now the tech and fancy double floor is just collecting dust. How can we breathe life into the data center, make it host our company apps and thus fulfilling its purpose?

This third and final part of the How to build a data center series will go through the tpics of virtualization, cloud and the mantra of high availability. Until now, we have invested a lot of money into building a data center, but there’s still one definitely large expense waiting for us – the disk array.

Continue reading

How to Build a Company Data Center: Part Two

This is a second part of our series about building your own data center. It picks up where we left off last time as we look at choosing the right hardware, ensuring high availability of all parts of the infrastructure and connecting all of the components into a modern computer network.

Last time we focused on choosing the right location for the data center and talked about basic power supply and cooling considerations, physical security and dual connectivity. We’re on the right track, but there’s still a long way to go till we reach a working infrastructure. Let’s go.

Continue reading

How to Build a Company Data Center? Part One

This article is a first in a series about building and managing a modern data center. Have you decided to build a brand new data center to meet your company’s needs? Then you have surely though about what type of a data center you’re going to build, how much technology is going to be inside it and at what temperature will these machines operate. However before all that, an absolutely key factor is just choosing the right place. The companies that chose to put all their data in Karlin-Prague – a district of Prague devastated by 2002 flooding – would now surely agree.

Continue reading

How does a CPU work? Look at transistors moving data in the first ever ARM processor

They are a heart of every personal computer, server, tablet or a smartphone. Technological marvels that even most IT professionals understand only in a very general way.

The CPUs.

Do you think that understanding the details of CPU architecture is a thing best left to the experts? Everyone can try to reach them now. It was never easier to get a glimpse into how exactly do CPUs really work.

A small group of volunteers calling themselves Visual6502 have built a virtual model of the old ARM1 CPU. The model is fully functional.

You can see how the tiniest parts of the CPU work and communicate together as they’re going through code right in your browser window. You get to see what exactly the CPU’s innards do when they run through low-level commands like CMP or MOV.

The ARM1 was chosen because it has a well-deserved place in the history of computing. It was the precursor of modern ARM architectures that are ruling the today’s mobile CPU landscape.

The virtual model of the CPU was also a birthday present for the ARM’s eponymous manufacturer. The ARM company has recently celebrated its 25th birthday.

Continue reading

He built our Prague data center from scratch. Now Petr Stepanek is its boss

He is in charge of everyday operation of the data center, taking care of customers and always thinking of innovation. Petr Stepanek is the company CFO and the director of Master DC Prague and he’s been with us since the beginnings. Ten years on, he still enjoys working here. Read on to meet one of our important people.

Continue reading

Neogenia: The cloud is amazing. We’re always trying to come up with yet another use for it

Neogenia, a successful young company from Brno, Czech Republic, has been excelling in the field of marketing for five years. They’re innovators who try to push the boundaries of their industry through modern technologies. Recently, they have got a new private cloud by Master DC.

What do they like about it the most, how did the migration to private cloud go and what are their future plans? Here are their answers, courtesy of Neogenia’s CTO, Jan Simecky.

Continue reading

Explained: How OpenStack works and six reasons you should have a cloud on this platform

There are many open source projects in the IT world, and others are cropping up daily.

Just a few of them make it up to the level where even multinational corps and companies begin to respect them.

The obvious example is Linux. It grew up from a one-person’s project to be an operating system used by a huge number of experts, companies and laymen alike. Relatively recently, even the experts from a rival company Microsoft started using Linux for some specific tasks.

Now the story seems to be similar for OpenStack, a cloud platform that is used to run more and more computer clouds all over the world. Big companies the likes of Intel or PayPal have adopted it and other corporations follow suit. Some people are already referring to OpenStack as the “king of cloud”.

So what’s the hype all about? How does OpenStack work? And what are its benefits for companies who want to use the cloud?

Continue reading

Don’t Get Swept Away: The Most Common DDoS Attacks are SYN and UDP Floods

The calm week of Adrian Newby, CTO, was about to change. His company provides internet-based software-as-a-service to its clients. One of those clients was now in trouble.

Their servers have started acting up.

They were receiving huge amounts of internet traffic they just could not cope with.

The symptoms were there. Newby knew that this were the beginning of a DDoS attack. A synchronized distributed effort trying to deny clients access to their services.

How did he face the challenge?

Continue reading

Stories of Evil Administrators: How to Avoid Losing Millions

Walter Powell lost his job that day.

After years of being an IT manager for a company helping drug addicts in Baltimore, his boss sacked him.

Powell decided to go out with a bang.

He used his technical skills and remotely uploaded a keylogging software onto the computers of his former employer, Baltimore Substance Abuse Systems. This soon got him employee passwords – including the login information of the company director who was responsible for Powell’s sacking.

The following month was chock-full of interesting events for BSAS.

Continue reading

Don’t Get Lost in the Clouds: Nine Questions to Ask When Choosing a Cloud Provider

I wish I thought of that five minutes ago.

Everyone knows this feeling. The best questions and answers often come to us too late, even hours or days later than when we needed. Sometimes a neighbour has such a stupid question that a brief, coherent and concise answer is hard to come by. Other times you get so stressed by an unfriendly atmosphere and long lines at a local bank that you forget some of the questions you wanted to ask.

In everyday situations, it’s okay to not say or ask the right things. You can always explain your point to your neighbour later or call the bank for further information. When you are making important decisions however, it’s better to be prepared.

One of the most important decisions businesses can make these days is the one about adopting the cloud. When negotiating about this relatively new technology, it’s possible to talk about many factors. Here are nine important questions you should ask when choosing a cloud provider, so that you don’t get lost in the cloud.

Remember: it’s important to be ready.

Continue reading

How to Improve Security? Three Ways You Can Learn to Think Like a Hacker

Hacking is bad.

This idea is deeply rooted among a lot of people. And many journalists only seem to make this notion stronger.

But it is, in fact, false. Hacking – in and of itself – is not bad. And people using it are not all criminals. In this aspect, hacking is similar to lock picking – the ability itself is not harmful and in the hands of a locksmith or a firefighter saving people from fire in a locked apartment, it’s actually very helpful. Only in the wrong hands can this ability do harm.

Hacking is just a tool; a skill that can be used ethically. And there are hundreds of people in the world doing just that, every day. Thanks to hacking, they can reveal security holes and vulnerabilities of various applications, they document them thoroughly and then pass them on to the app’s developers. In short, they help to improve the world of cyber security. Almost every university in the world has its own team of such specialists.

Continue reading

Disasters could take down half of data centers worldwide. There’s a way to protect the data

The flood has gotten everywhere. Both the ground floor and the basement with the generators’ fuel were under water. It was a disaster. “We really didn’t expect the storm to have a significant effect on the data center,” Peer 1’s vice president Ryan Murphey recounted a year later. His company had not prepared for the hurricane Sandy that was about to hit New York. Only two employees were left in the data center at the time. He added: “At the worst, we thought the facility might lose utility power, and Jeff and Mike would need to switch to the building’s backup generators.”

Their servers, located in the building’s second floor, survived the storm intact.

However, the water flooded the underground, where fuel reserves were located. As well as pumps that were to carry that fuel up to the generators on the seventeenth floor. The storm disrupted not only the power coming from the grid, but also the datacenter’s backup system.

The generators were okay, but they were running out of fuel fast. Their fuel consumption was too high to be covered just by a small backup fuel tank on the generators’ floor.

The disaster created one of the most engaging data center stories of the recent past.

Continue reading

Shadow IT: When Users Want to Make IT Decisions

Be it work, sport or games, a lot of people have a competitive streak that drives them towards better results, again and again. Especially at work, there are many reasons to strive for success. Respect of bosses and co-workers, pay rise, promotion or a prospect of a better job, all those things drive us towards doing the best we can.

But what if there are artificial obstacles to productivity?

That’s exactly the problem many employees all over the world face daily. They strive for better results, effectivity or just user comfort, but are held back by company IT and their rules.

Even when employees feel that a particular application could make their job much easier, they can’t use it on company’s equipment. The installation is blocked by their limited user rights – which pushes a lot of people to trying to circumvent them. This is what experts call shadow IT.

Continue reading

Are SSDs suitable for servers? A Comparison of Pros and Cons of SSD and HDD, part two

The new way to store data called solid-state drive or SSD has a lot going for it. It’s faster, lighter and more resistant to elements. Is it more suitable for server use than regular HDDs, though? That is the question we are trying to settle in this two episode comparison series. This one will see us go through prices, energy requirements and future outlooks of both technologies. You can read the first part of this comparison here.

Continue reading

There Is Less Email Spam Around. Scammers are Moving to Social Networks

I am a Nigerian prince and I need your bank account number and your PIN. Earn ten thousand dollars per hour. Or just in short: ‘Cheap Viagra’. Messages like these arrive in ever smaller numbers these days. And that’s great. Spam has tricked a lot of people in the past, but that’s going to end eventually. Because criminals are shifting away from email spam and spam statistics are on the decline.

Continue reading

Are SSDs suitable for servers? A Comparison of Pros and Cons of SSD and HDD, part one

Disks with magnetic plates are done for. They are slow, they don’t take abuse well and their repair is half witchcraft, half alchemy – what other computer component can be fixed by baking it in the oven just as well as stashing it in the freezer? We should really get rid of them.

In all possible use scenarios, they are to be superseded by a new technology called solid state drive or SSD, that is much faster, newer, better.

But isn’t that just a marketing ploy to sell a new tech?

Read the first part of our comparison of pros and cons of SSDs and classic hard drives. In this post, we’ll introduce the new contender and look at two particular aspects – speed and capacity.

Continue reading

DDoS attacks are stronger and more frequent than ever. Admins must protect their servers

The internet gets a bit more dangerous every day, it seems.

Several unrelated investigations from different security companies all bring very similar results. Lately there has been an increase of distributed denial of service (also known as DDoS) attacks, through which culprits attack servers and make them inaccessible to regular users.

Servers and other network elements get overwhelmed by an incredible amount of requests that can slow them down or even push them over the edge and crash their network completely. And in the case of a distributed attack these requests come from all over the internet and have different information attached to them, making it very difficult to tell them apart from regular users’ requests. Though their requests might not even reach the servers – DDoS attacks can ‘block the pipes’.

Fighting against DDoS is not easy.

Criminals know this, and tend to use them ever more frequently these days.

Continue reading

Five Fears That Keep Some Companies Away From the Cloud (And How to Get Over Them)

We are all afraid of something.

We fear that something might happen to our loved ones or that we won’t have enough money, some people are afraid of clowns or even just darkness. Fear can be a helpful ally when dealing with everyday situations.

But we should not listen to fear when deciding the adoption of a new technology that could greatly boost our business.

A lot of people are still quite cautious of cloud computing. They hear others talk about it and praise it, see them use it. But they still don’t want to take the leap themselves. And maybe they’re right, the cloud might not be the optimal solution for every business. It depends on the circumstances. But for most companies the cloud can and will be helpful, it will increase their effectivity and save them time and money. However, it’s quite normal to be a bit wary of something new. If you are still somewhat unsure about the cloud, here is a list of five most common fears of the cloud and how to get over them.

Continue reading

What is Cloud Elasticity and How Does it Save Your Business Money

“You will save money.”

This sentence seems to be said in every list of advantages of the cloud. The shift away from physical servers and into the cloud brings a lot to the table, but money saved is the most important aspect for a lot of people.

But how exactly does it save you money? It’s mainly thanks to one factor – elasticity. Let’s look at what it actually is and how can it help you save money.

Continue reading

How Data Center Free Cooling Works and Why it is Brilliant

The best things in life are free.

A lot of the important stuff, however, is not. And it’s all the more painful when we realize we’re paying for something we could have gotten for free.

The free cooling of data centers is practically free. And paying for a standard compressor-based cooling seems really unnecessary in comparison. But let’s take it from the top:

Cooling is key. Without it, IBM data centers in north Italy would be as hot as pizza ovens in the company cafeteria. But how can you keep the servers from burning and not bankrupt your company in the process? With a technology called free cooling.

Continue reading

The right place for your data