Earth’s fastest supercomputer is here. Do you want to know more?

These are the features of the new fastest supercomputer in the world and you will love it!

Continue reading

Best hacking simulators to make you feel like a hacker

Experience what it feels like to be in charge of a cyber attack and have fun in the meantime with this hacking simulators.

Continue reading

How 5G will move the cloud to the next level

5G will arrive to make your life faster and easier in harmony with the cloud. We'll explain you why.

Continue reading

Computers could read your dreams and even decode them very soon

What if a computer could reveal the meaning of your dreams? What if the same computer could project your dreams as a movie after you wake up? This can happen very soon.

Continue reading

How to recognize between a virtual machine, a virtual server and a virtual network

If you are new in virtualization, you must take a look at this brief introduction to get to know its basic architecture.

Continue reading

Why is Google preparing to get rid of the URL?

Google is seriously thinking of burying the URL very soon. Discover what is behind this controversial decision.

Continue reading

How to backup cloud servers? Find it out here

Discover the difference between a cloud server backup and a physical one and get to know which vendors can help you with it.

Continue reading

Top 10 best websites to explore in the Deep Web

Take a look at the content that lies in the underworld of the public network through the best Deep Web websites

Continue reading

The future of augmented reality technology will be in the cloud

Get to know how the integration of augmented reality into the cloud will change your interaction with the world.

Continue reading

Get to know Shodan, the scariest Search Engine on the Internet

Have you ever heard of Shodan? Discover why it is considered the devil inside the internet of things!

Continue reading

How to secure your server: 5 tips for the best server protection

Protect your data from intruders. With these security measures, you can set a good server protection system.

Continue reading

Facebook stress: the social network controls you through dopamine

How much time do you spend on giving and checking your likes every day? You could be under Facebook stress.

Continue reading

What is Cyber Blitzkrieg and why is it important to avoid it

Get to know what is Cyber Blitzkrieg, the apocalyptic scenario caused by a lethal cyber war.

Continue reading

The most interesting IT conferences before the end of the year

You are still on time to catch some of the most exciting IT summits. Take a look to the technology current events!

Continue reading

IP address: how does it work and five tools to browse anonymously

This is what you should know about your IP address and some effective ways to protect your privacy when browsing anonymously.

Continue reading

Dedicated Server or Managed Server? What you need to consider to choose one of them

Have you reached the point where you must decide between a Dedicated or Managed Server? We will help you make the right choice.

Continue reading

How to start using OpenStack

Find out how the basic OpenStack architecture works and the current possibilities to start using it.

Continue reading

What did these guys to be considered the most lethal and famous hackers in history

These guys were capable to put governments and corporations on their knees. Get to know the most famous hackers in history.

Continue reading

Get to know Ray Kurzweil, the prophet of the digital era

This is how Ray Kurzweil unveils the future. Get to know the man who is called the ultimate thinking machine.

Continue reading

Darkness for dummies: differences between the Dark web and the Deep web

Both of them are like a black hole but they are a little bit different. Take a look into the Dark Web and the Deep Web.

Continue reading

Best music for programmers: increase your concentration and get the code done

Get focus and increase your brain productivity by listening to this great music for programmers

Continue reading

Methods and strategies to set up the right data backup

Compare the pros and cons of each data backup method to design the best restoration strategy.

Continue reading

Why is Nanotechnology a way to play God?

What would you think if a small robot, almost invisible, could connect your brain to the Internet, cure cancer or destroy the Earth? Discover the universe of nanotechnology.

Continue reading

Quantum computer might change the world in the next five years

Take a look at the most exciting technological race in the world: quantum supremacy or how a quantum computer will change the paradigm of computer science.

Continue reading

Malware protection: common threats and five effective removal tools

Find out if your computer has been attacked by one of these threats and how to get rid of them with the best malware protection.

Continue reading

Increase your Wifi security using these algorithms

Do you know how to increase your Wifi security? Find out here what the best algorithm is to keep intruders away.

Continue reading

Cloud technology in cars can save your life and make it more enjoyable

The next automotive revolution will happen thanks to the cloud technology in cars. Find out why.

Continue reading

Beginner´s guide to mining Bitcoins: How to mine Bitcoin step by step

Are you interested in mining Bitcoins but don´t know much about cryptocurrencies? In this article we help you to choose a mining rig, a software and a Bitcoin wallet. We also advice you how to mine profitably.

Continue reading

Bitcoin mining in theory: what is the principle of mining?

How exactly does Bitcoin mining work? How many Bitcoins are there and how many of them still remain unmined? Find all the answers in this article.

Continue reading

Malware in ads causes trouble for millions of people. But ad publishers still fight against ad blocking

Digital advertising is ever so often spreading malware, even on big name websites. People therefore increasingly turn to ad blocking. But the publishers don’t like it. Is there a way out of this?

Continue reading

Hackers are learning from mafia. They extort a “protection” fee under a threat of DDoS attacks

Criminals claiming to be a hacker group extort money from companies. They threaten them with a DDoS attack. But it seems they might not actually be able to run any sort of attack.

Continue reading

Watch out for security cameras, warn experts. Research found holes in security

Experts found vulnerabilities in surveillance devices. Security cameras and DVR devices are favoured by hackers for a reason. Think about securing this aspect of your network as well.

Continue reading

Scientists built a new quantum computer. It’s made of five atoms and “self-destroys” after each use

Scientists managed another breakthrough. They built a quantum computer that can execute the difficult Shor’s algorithm. It’s just five atoms big, but the experts claim it will be easy to scale it up.

Continue reading

The fastest computer in Europe will get a sizeable upgrade: 4500 new GPUs and faster CPUs to boot

The fastest European supercomputer will get a hardware gift. The Swiss supercomputer center CSCS will replace its GPUs and CPUs, almost doubling its performance.

Continue reading

SSL certificates explained: What SSL is, how it works and why you should use it as well

Some people trust webpages when they show them an icon of a lock. But internet security is not as simple as that. Read all about the SSL certificates, how do they work and why should you use them on your company server.

Continue reading

Moore’s law grew the IT business for 51 years. But today’s anniversary might be its last

Today is the anniversary of Moore’s law. Fifty-one years ago Gordon E. Moore predicted the CPU development pace for the coming years. And his “law” has set the pace ever of IT industry ever since.

Continue reading

Dell brought out a honey-filled trap for hackers. It lures them with fake credentials

Administrators might just have gotten a new weapon against hackers. Dell has published DCEPT, a tool that lures hackers into its traps. It’s free, open source and already evolving.

Continue reading

MouseJack: Security experts found a way to hack any computer through its mouse

A new vector of attack uses mice. Hackers can take control of a computer through a wireless mouse. Only wired and Bluetooth devices are safe from this powerful exploit.

Continue reading

Scientists created a new type of CPU that communicates using light instead of electrons

Scientists created a new CPU that uses light instead of electricity for its IO operations. The throughput density of the chip is up to fifty times greater than that of current processors – and it saves energy as well.

Continue reading

Catch old viruses: The Internet Archive adds a museum of DOS malware

The Internet archive has created a Malware museum. How did viruses work back in the ages of DOS? Now you can see for yourself.

Continue reading

How to Build a Company Data Center: Part Three

Your data center is almost done. Both the building and the hardware are ready. But how do you breathe life into it all? Read the final part of a guide made by our resident experts to find out.

Continue reading

How to Build a Company Data Center: Part Two

Setting up network in a new data center need not be overly complicated. Read our detailed guide to find out what are the things to watch out for.

Continue reading

How to Build a Company Data Center? Part One

Have you ever thought about building a data center for your company? It’s a complex endeavour, but with the help of this guide, you should be well prepared. Read part one of our How to Build a Data Centre series.

Continue reading

How does a CPU work? Look at transistors moving data in the first ever ARM processor

A new virtual model of an ARM1 CPU shows the way data moves in a working chip. Look at the inner workings of a predecessor of modern CPUs that dominate the mobile market.

Continue reading

He built our Prague data center from scratch. Now Petr Stepanek is its boss

How did the Prague branch of MasterDC start out? And how does its director Petr Stepanek see the future of the company? Read all about it in the first of interviews with members of our teams.

Continue reading

Neogenia: The cloud is amazing. We’re always trying to come up with yet another use for it

Neogenia from Brno is very satisfied with our cloud solution. Why did they choose it and how did the migration go? Learn about their experience from Neogenia’s CTO Jan Simecky.

Continue reading

Explained: How OpenStack works and six reasons you should have a cloud on this platform

Cloud technologies are ruled by OpenStack. An open platform that keeps pushing the cloud ever further. What is it? And what advantages could the “king of cloud” have for your company?

Continue reading

Don’t Get Swept Away: The Most Common DDoS Attacks are SYN and UDP Floods

It’s not easy to stand your ground against DDoS attacks. It’s best to be ready and know the methods of your attackers. Read about two most common types of DDoS – UDP and SYN floods.

Continue reading

Stories of Evil Administrators: How to Avoid Losing Millions

Sabotage, theft of passwords and techniques, revenge for dismissal. Some administrators spoil the good name of the others. Why such cases happen and how they can be avoided?

Continue reading

Don’t Get Lost in the Clouds: Nine Questions to Ask When Choosing a Cloud Provider

Choosing the right cloud is not a simple matter. What should you focus on when picking a provider? Read the most important questions that might make your choice easier.

Continue reading

How to Improve Security? Three Ways You Can Learn to Think Like a Hacker

Get into a mindset of a hacker with these helpful learning tools. It will help you improve the security of your servers. And hacking can even earn you some money through contests or bug hunting.

Continue reading

Disasters could take down half of data centers worldwide. There’s a way to protect the data

Some data centers can even withstand being hit by a rocket. Others fail in a small storm. Defend your data, pick a provider that can withstand natural disasters.

Continue reading

Shadow IT: When Users Want to Make IT Decisions

According to the latest surveys, most companies have a group of users that try to bypass company IT rules. Why are they doing it and how can you prevent shadow IT?

Continue reading

Are SSDs suitable for servers? A Comparison of Pros and Cons of SSD and HDD, part two

What type of storage should you use in servers? Good old mechanical HDDs or new flash-based SSD? Read the part two of our comparison to find out about their pros and cons.

Continue reading

There Is Less Email Spam Around. Scammers are Moving to Social Networks

There’s been less and less email spam being sent every day. Is the internet safe already? Not really, it’s just that the attackers are looking for other ways to scam people.

Continue reading

Are SSDs suitable for servers? A Comparison of Pros and Cons of SSD and HDD, part one

What storage tech should you choose for your server? SSD or HDD? Part one of our series that compares the two is focused on their inner workings, speed and capacity.

Continue reading

DDoS attacks are stronger and more frequent than ever. Admins must protect their servers

Admins were kept very busy these last few months. There have been more DDoS attacks on servers lately, and they were stronger and lasted longer than ever before.

Continue reading

Five Fears That Keep Some Companies Away From the Cloud (And How to Get Over Them)

It’s easy to be a bit wary when considering the adoption of a new technology for your company. But with cloud, you don’t have to worry about a thing. Here’s how you can get over the five most common fears of the cloud.

Continue reading

What is Cloud Elasticity and How Does it Save Your Business Money

Free cooling is the best way data centers can save millions of dollars. Even huge companies such as Facebook or Google have grown fond of this tech. Why is free cooling so brilliant?

Continue reading

How Data Center Free Cooling Works and Why it is Brilliant

Free cooling is the best way data centers can save millions of dollars. Even huge companies such as Facebook or Google have grown fond of this tech. Why is free cooling so brilliant?

Continue reading

The right place for your data

OUR DATA CENTERS ARE LOCATED IN PRAGUE AND BRNO