A new data center dedicated to artificial intelligence will be built in Kanice, near Brno, Czech Republic. MasterDC plans to begin operations in the autumn of 2026 in a former military complex that includes telecommunication fallout shelters. The site stands out mainly for its high level of security.
Elasticsearch and OpenSearch are powerful search engines that enable even the largest global corporations to process petabytes of data in real-time. So, why should you be interested in them right now? You can use them to meet the upcoming NIS2 requirements. Let us find out how the software differs and what you will pay extra […]
The setup and management of a VPS are no longer the exclusive domain of technically proficient users or data center professionals. Nowadays, you can deploy a VPS online, and thanks to new tools, you can take care of it even with basic server management knowledge.
One-click connectivity is as simple as it sounds. Without needing to build network infrastructure, you can connect to any cloud in the world with just a few clicks. So, how can you leverage it for the benefit of your business?
If you have not heard of cloud repatriation yet, have you been living under a rock? This new trend has been sweeping through global corporations as well as Czech companies for several years now, but what are the reasons for leaving the cloud, and are we facing a mass return to on-premises?
Better systems or more powerful environments are some of the reasons that motivate companies to migrate data, but how do you avoid unnecessarily long downtimes and prevent compatibility issues? We have put together some practical tips for you.
Where do you find the latest IT news and follow the latest trends? That is what we asked the experts – MasterDC Administrators.
Ransomware attacks cause significant financial losses and reputational damage to businesses. What should you know about this threat, and what methods can you use to defend against it?
How will AI-powered attacks impact cybersecurity? We have compiled a summary of the past year and the prospects for 2024.
At MasterDC, we design solutions for customers in a variety of industries. We are also no strangers to the healthcare segment. In fact, it is exactly the opposite. Read on to learn how we specifically helped the EuroPainClinics network of specialised pain management clinics.
What is a hybrid infrastructure, and what does it bring to companies? We have prepared a clear summary of information on hybrid solutions, including examples of infrastructure and how to connect on-premises services and multiple providers.
The world is fighting back against cyber threats. This is demonstrated by the increasing investment of companies in securing their systems and stricter laws against attackers. However, many myths about cybersecurity put people at unnecessary risk.
The product portfolio of multinational providers offers almost endless possibilities. However, the benefits of the global giants’ offerings are not endless. Domestic companies are also looking for local suppliers. As a result, Czech localisation (or cloud in Europe) is being welcomed by many of our customers; let us tell you why.
Most employees working from home or in the field already know not to click buttons or download attachments in untrusted emails. However, they may not be aware of some of the risks that are not discussed as much. Therefore, companies must proactively manage threats and combine home office security with employee comfort.
NVMe SSDs dramatically increase a server’s performance. When selecting them, you will be primarily interested in their read and write speed, bandwidth, and capacity, but what should you look for, and how do you use them effectively? The following article outlines what NVMe SSDs are, together with other tips for increasing your server’s performance and […]
Support for microservices, highly available NFS or building private clusters. This is just part of the reasons that led us at MasterDC to deploy software-defined storage on vSAN for the cloud. What else will the new architecture provide to customers?
Amazon’s diverse portfolio of web services is attracting more and more businesses and individuals. Navigating the complex ecosystem of services is not easy, and a poorly thought-out combination of services can drive overhead costs sky-high. How to avoid unnecessary extra costs?
Maybe it happened to you; you had the database up and running, and everything was working as it should, but after a while, you started to experience sudden overloads and unavailability. Well, there are only a few common reasons for such instability, and if you know how to do it, you can easily eliminate them.
How do you increase and, above all, maintain the security of your network, server, or operating system? Well, in addition to regular scans and continuous updates, there are a few basic practices to get you started on strengthening a system’s security. To start, we will guide you through the first steps of hardening.
Last year’s most frequent incidents on the MasterDC network were DDoS flood attacks. So how does cyber security fare in today’s uncertain times? First, let us read about the most vulnerable elements of infrastructure and tips for stronger prevention.
The advantages of managed IT services such as SaaS, PaaS, or even IaaS are all presented around the transnational providers’ portfolios. But what do you actually get for something that costs you a bundle every month?
When choosing a VPS, you should always consider what market you want to focus on first. For example, the location of the virtual server is often underestimated when, in reality, it is extremely important to the latency level and legislation side of the business. Find out why and what other aspects you should consider before […]
It does not seem much practical to store all data on a hard disk server. External data storages are hence a popular way to extent the server capacity. Nevertheless, their features and initial costs differ considerably. Therefore we summarise their pros and cons in order to make the choice easier for you.
He started in a recruitment agency as a CV database administrator and later became a recruiter. The fact that his four-legged partner Amigo accompanies him during interviews does not prevent him from anything; on the contrary. Recruiter Petr Adamec explains why he does not inform the interviewees about his handicap in advance and offers an […]
The choice of the right firewall might be really tough; it depends on how you need to filter the traffic and what your security requirements are. To make it easier for you, we jotted down how the firewalls work, including the differences between pfSense, MikroTik and FortiGate solutions which are all provided by the MasterDC. […]
If you are considering which virtualisation server to choose but are not familiar with the differences between the technologies, this article might be of help. You will get to know which basic virtualisation types exist and what the difference between KVM and LXC virtualisation, which are generally used for VPS servers in MasterDC, is.
Are you familiar with how the blind and users with visual impairment in general surf on the web? You may have never thought about it but thanks to various technologies and tools they are able to read messages, respond to emails and order dedicated servers the same way as any non-disadvantaged person. However, there is […]
We are all afraid of something. We fear that something might happen to our loved ones or that we won’t have enough money, some people are afraid of clowns or even just darkness. Fear can be a helpful ally when dealing with everyday situations. But we should not listen to fear when deciding the adoption […]
This sentence seems to be said in every list of advantages of the cloud. The shift away from physical servers and into the cloud brings a lot to the table, but money saved is the most important aspect for a lot of people. But how exactly does it save you money? It’s mainly thanks to […]
Disks with magnetic plates are done for. They are slow, they don’t take abuse well and their repair is half witchcraft, half alchemy – what other computer component can be fixed by baking it in the oven just as well as stashing it in the freezer? We should really get rid of them.
The new way to store data called solid-state drive or SSD has a lot going for it. It’s faster, lighter and more resistant to elements. Is it more suitable for server use than regular HDDs, though? That is the question we are trying to settle in this two episode comparison series. This one will see us go […]
The flood has gotten everywhere. Both the ground floor and the basement with the generators’ fuel were under water. It was a disaster. “We really didn’t expect the storm to have a significant effect on the data center,” Peer 1’s vice president Ryan Murphey recounted a year later. His company had not prepared for the […]
Everyone knows this feeling. The best questions and answers often come to us too late, even hours or days later than when we needed. Sometimes a neighbour has such a stupid question that a brief, coherent and concise answer is hard to come by. Other times you get so stressed by an unfriendly atmosphere and […]
Neogenia, a successful young company from Brno, Czech Republic, has been excelling in the field of marketing for five years. They’re innovators who try to push the boundaries of their industry through modern technologies. Recently, they have got a new private cloud by Master DC.
He is in charge of everyday operation of the data center, taking care of customers and always thinking of innovation. Petr Stepanek is the company CFO and the director of Master DC Prague and he’s been with us since the beginnings. Ten years on, he still enjoys working here. Read on to meet one of […]
They are a heart of every personal computer, server, tablet or a smartphone. Technological marvels that even most IT professionals understand only in a very general way. The CPUs.
This article is a first in a series about building and managing a modern data center. Have you decided to build a brand new data center to meet your company’s needs? Then you have surely though about what type of a data center you’re going to build, how much technology is going to be inside […]
This is a second part of our series about building your own data center. It picks up where we left off last time as we look at choosing the right hardware, ensuring high availability of all parts of the infrastructure and connecting all of the components into a modern computer network.
Would you like to try out a virus? You probably don’t hear an offer like this a lot. But now it’s time to seriously think about it – as a newly established Malware museum offers just that. It’s a collection of old viruses, worms and other malicious software hailing from the long-passed ages of DOS and it […]
In the previous article of this series, we furnished a data center with network technologies. But now the tech and fancy double floor is just collecting dust. How can we breathe life into the data center, make it host our company apps and thus fulfilling its purpose?
Unexpected miracle. This nickname and many like it have been quickly ascribed to a new kind of CPU that has been created by a group of scientists from three US universities.
Several unrelated investigations from different security companies all bring very similar results. Lately there has been an increase of distributed denial of service (also known as DDoS) attacks, through which culprits attack servers and make them inaccessible to regular users.
Hacking is bad. This idea is deeply rooted among a lot of people. And many journalists only seem to make this notion stronger.
The calm week of Adrian Newby, CTO, was about to change. His company provides internet-based software-as-a-service to its clients. One of those clients was now in trouble. Their servers have started acting up. They were receiving huge amounts of internet traffic they just could not cope with. The symptoms were there. Newby knew that this […]
There’s a new way for hackers to get control over a computer and it’s surprisingly simple. They can just take control of their target’s mouse. Security experts found a fault that allows a hacker to hijack a computer through a wireless mouse of their victim with just a cheap USB dongle and few lines of […]
There are many open source projects in the IT world, and others are cropping up daily. Just a few of them make it up to the level where even multinational corps and companies begin to respect them.
A hacker combing through a company network stumbles on a lucky find – the memory of one of the servers holds login credentials of an administrator. And already he’s made a mistake. The trap has sprung. The hacker tried to take hold of fake credentials that were intentionally left there by the server’s defenders. They […]
“We want internet to be safer!” think lots of people all over the world. And experts are working on just this day and night. However, results of their hard work are often so difficult to understand that only security experts themselves know what has been accomplished. This is the case with SSL certificates. While IT […]
Maybe you know a person like this. He or she will adamantly claim that they have never been to any suspicious or dangerous websites, have never opened an email attachment as long as they live and have never downloaded anything. And yet they have a computer haunted by malware. However, the time has come for […]
Can you imagine you could unlock your car only by using your smartphone? Would you appreciate getting an alert from your car on an icy or slippery road? No matter how vivid your imagination is, it is very likely this situation is not from a very far future. Nowadays, automakers cooperate intensively with software developers […]
Most users are not aware of their wifi security. Routers have unsafe configurations that make them susceptible to malware attacks. For instance, there are security failures in the operating system, the firmware, the security algorithm and the web applications of routers. Attackers can use these vulnerabilities as entry points to compromise your network. In fact, there […]
How strong is your malware protection? Malicious software compares to any human disease. Our digital life is always exposed but chances can be minor with prevention. Malware has several mutations that affect computers and devices depending of the magnitude of each attack. 360,000 new Malware is detected every day. Although internet security companies work harder than […]
Data loss can destroy a company in a few seconds in different ways: hacking, a fire, intentional and unintentional deleted information, etc. That’s why data backup should be considered much more than a simple practice, but a culture of prevention for companies and individuals. Let’s see what is behind every backup method to design a […]
Do you have a deadline and need to focus more than ever on those lines of code but your brain is on vacation in Thailand? Maybe you need some audio therapy to recover your concentration and get the job done as soon as possible. Try the best music for programmers based on scientific studies. Avoid […]
What are the differences between the Dark web and Deep web? If we compare the Internet to a city, we can distinguish different zones clearly. Just like a city, the Internet has secure zones and risky zones, fancy neighborhoods where you would like to live in and those areas where it´s better to don’t hang […]
Thinking about the best-managed hosting? Or maybe you need to expand the capacity of your private network and storage resources! Then you have to choose between a dedicated server or a managed one. But do you know what are the servers types differences? Find out and make the right choice.
Want to browse anonymously? Start paying attention to your IP address. Just as your telephone number or your house address, the IP address shows your location as soon as you start browsing. Without the IP address, your internet connection would be impossible. On the other hand, it can make you vulnerable to different web threats […]
Have you ever heard about something called Facebook stress? Checking Facebook when waking up and before sleeping has become part of the daily ritual of many people around the world. Also giving likes, writing comments and sharing content has been added to the dynamics of social interaction. But what makes this social network so addictive? […]
Server protection is one of the biggest concerns for security teams nowadays. Weak protection can open the door for attackers to gain unauthorized access to your server through several types of malware. Today cybercriminals are more aggressive than ever. Set up your server protection with these basic steps to keep attackers away.
Can you imagine a search engine unleashing a cybernetic apocalypse through a simple online search? Shodan can do it. Shodan is considered one of the most dangerous search engines. Although is not easy to use for most Internet users, experts in cybersecurity and hackers can work with it. To give you an idea of the […]
Do you remember the furor caused by the game Pokemon Go? That was one of the first massive experiences of contact with augmented reality technology that the world had experienced. Beyond the Pokemon Go´s madness, this showed us what our interaction with the internet of things might look like in the near future. Imagine being able […]
Since cloud computing became popular, a server backup stopped being a two-stage analog process and became a complex series of steps executed by software specialized in cloud server back up. But what are the main differences between supporting a physical server and a virtual one? In this article, we will cover this topic together with a […]
When you google “what is a virtual machine”, you will get back results such as virtual servers, virtual networks, etc. But if you do not have a piece of basic knowledge on this topic, trying to understand the elements that make up the architecture of virtualization can be a bit confusing. In this article, we try […]
A lot of new apps are developed every day. There are more than 6 million apps available in the App Store and Google Play. Taking into account that users prefer mobile devices to connect to the Internet, everyone wants to include a mobile app on their digital platform. But not everyone knows why or how […]
Choosing a safe password became one of the most common issues against the security and privacy of thousands of users around the world due to hacking. However, in many cases, the users themselves are those who facilitate the work of crackers to steal their login credentials. Not choosing a good password is like leaving your […]
Maybe you have noticed that tech-websites are mentioning quite often something called “machine learning”. Beyond what you can imagine, we can tell you that every day you use technology based on this technology. And yes, as the name implies, it is the automatic learning performed by computers to accomplish tasks using the experience they get […]
They say “new year, new life” and regarding digital trends, in 2019 we will see the launch of new technologies that have been cooked for a while in research laboratories around the world. The technology disruption of 2019 will be led by topics such as artificial intelligence, augmented reality, quantum computing, and the blockchain. In […]
Every day, cybercriminals create new ways to carry out online frauds. This also goes for a new form of cyber fraud called Angler Phishing. This threat uses social media to attack its victims. Through deceptive messages posted in a fake social media account, the criminal collects confidential data. Be aware of how Angler Phishing works, […]
What advantages does a private cloud have? The answer is still unknown for many users. You might need a private cloud right now and you may not even know it. There are many factors that influence the decision to hire a private cloud service. Everything will depend on the needs of your company and the […]
Data migration to the cloud is like switching to a more spacious and functional house. It’s cheaper because you’ll save on expensive infrastructure, you can expand storage as much as you want, and you do not need to put your IT team to work on server maintenance. In this article, we explain these and other […]
The revolutionary REST API add-on is nothing new to anyone in the WordPress world. Rumors about it started even before it had been created and people are still talking about it three years later. The official REST API manual will tell you that “only your own imagination is the limit of what you can create with WordPress […]
Are you wondering how to start working with WordPress REST API? This simple tutorial for programmers with no REST API experience might just be the answer to those questions. In the article, you will learn how to work with Postman, what are endpoints and routes, how to authenticate yourself and how to communicate with REST […]
The REST API in WordPress has a great variety of use, as we wrote earlier in the series. In the article, we will present you one option of how to use it in practice. What exactly will you learn? We’ll show you how to create an app that can display, publish, and categorize unpublished posts […]
Have you ever heard the term containerization? Possibly not. The use of containers in virtual environments is not new because it has been used for several years. However, the technological improvements have made the containerization popular again thanks to the lightness of its execution compared to a virtual machine. In this guide, we will tell […]
Firewall history goes back to the 90s when multiple security fails were detected in the first Windows versions. These vulnerabilities in Windows forced experts to work on the creation of an application capable of protecting the system by blocking malicious or unwanted traffic from the network. Thus the Windows firewall was born as a defense […]
If you are trying to become familiar with the technology that relies on the interconnection between applications and services, probably you have heard the term API several times. If you still do not know what it is, we can introduce it by saying that API is the abbreviation of what is known as Application Programming […]
Working as an IT requires lots of concentration and sometimes it is necessary to go through high doses of stress or mental fatigue. Although many would like to escape from work for a year, not everybody can make such kind of decisions in the middle of a promising career. Luckily, there are some relaxation apps […]
2019 will surprise us with technological improvements that will boost global connectivity such as the implementation of the 5G network. However, this also means the evolution of cyber threats that companies must face, since technological improvements become new opportunities for the development of more powerful and sophisticated malware. We just need to take a look […]
Cyber attacks are a daily issue for companies but when you face an SSL threat you are in big troubles. While most users believe that encryption offers an impenetrable shield for hackers, security experts know perfectly that hackers can manipulate SSL certificates to send any kind of malware without being detected. Take a look at the following […]
Google is part of our daily life as public transport or the coffee machine, and sometimes that routine makes us stop seeing the funny and interesting Google side. Most people use Google search engine automatically as soon as they turn on the mobile or the computer but many are far away to know all its […]
Preventing hackers from taking down your systems is a never-ending race, with the side that adapts the quickest being the winner. Unfortunately, many businesses recently haven’t been taking this competition very seriously. A DDoS attack still can put upside down any business as hackers find new ways to infiltrate the strongest systems.
Choose the best web monitoring for your websites and servers Are you always thinking about him? Do you have trouble sleeping at night because of him? Does it drive you crazy when he’s unavailable? If these questions made you think of website availability, this article is for you. We’ll break down which tools can help […]
Containers are for everyone. Learn how to start with them When working with software, countless companies have bemoaned the fact that the virtual machines needed to run different parts of it increase their costs considerably. Recently, many have started using a method called “Containerization,” which bundles the application together with all of its related configuration […]
Get to know more about the future of the apps development As soon as applications became larger and complex developers faced the challenge to make apps more flexible to changes without compromising the integrity of the entire application. The answer was microservices, a new software architecture that giants like Amazon or Netflix find critical to keep […]
Your home could be in danger because of the IoT The IoT (Internet of Things) has been changing the world for the last 10 years. Our daily life is much more easily connected to the network and we started being dependant on what our IoT devices can do for us. However, the lack of security […]
IT technologies have a great future ahead which is also surrounded by many threats It is not so common for technologies to stay in the limelight for a long period of time. Usually they just become ordinary and create a building base for new ones. That is why predicting the state of IT even in […]
The best things in life are free. A lot of the important stuff, however, is not. And it’s all the more painful when we realize we’re paying for something we could have gotten for free. The free cooling of data centers is practically free. And paying for a standard compressor-based cooling seems really unnecessary in […]
Disasters of any kind occur at any time and the best way to respond to them is through prevention. So, what is disaster recovery? the essence of what we know as business continuity. A disaster recovery plan is a shield to protect the companies’ infrastructure in the event of natural disasters, cyber attacks or any […]