The case for internet anonymity.

Trolls may thrive on anonymity, but there are plenty of other reasons for wanting an online pseudonym, finds Jessica Furseth.


Head In The Clouds: An Introduction To Cloud Computing


What really goes on up there? Neil Cumins investigates


Bash Critical Vulnerability – Check now!

There has been a critical vulnerability found in Bash. The vulnerability affects Linux/Unix distributions that use or have Bash installed.


UK Government Publishes Guidance Document on Cloud Services

Government UK Cloud

“This guidance is intended to help organisations consider the security features of cloud services they wish to use. It is the first of a number of guidance documents for the public sector relating to the use of cloud services to process OFFICIAL information. “ ~ UK Government


The benefits of colocation


While the colocation hosting model is being pressured by other flavors of server delivery including virtual private servers, private clouds, and hybrid cloud implements, it continues to be a major drawcard for IT managers and companies who wish to maintain control and ownership of compute, storage and network devices.