shutterstock_153830195

The Case For Internet Anonymity

Posted by Grant McMaster

Trolls may thrive on anonymity, but there are plenty of other reasons for wanting an online pseudonym, finds Jessica Furseth. (more...)
shutterstock_198046421

Bash Critical Vulnerability – Check Now!

Posted by Madeleine Bruce

There has been a critical vulnerability found in Bash. The vulnerability affects Linux/Unix distributions that use or have Bash installed. (more...)
Government UK Cloud

UK Government Publishes Guidance Document on Cloud Services

Posted by

“This guidance is intended to help organisations consider the security features of cloud services they wish to use. It is the first of a number of guidance documents for the public sector relating to the…
colocation

The benefits of colocation

Posted by

While the colocation hosting model is being pressured by other flavors of server delivery including virtual private servers, private clouds, and hybrid cloud implements, it continues to be a major drawcard for IT managers and…
Software developer

Automating Virtual Datacentres for ISVs

Posted by

While many business leaders are now internalizing the general benefits of cloud technology, including the ability to scale resources up or down during seasonal spikes in activity, there is perhaps one area that should be…
dell-IaaS

Four Reasons Why Dell Dropped its IaaS Cloud Service

Posted by

Dell will offer public IaaS through partner companies rather than its own public cloud, according to an IT World article of May 20, 2013. It’s one of the first prominent providers which has decided to…
Stop blending in with the rest of the crowd and start leaving your mark on the web