Category: Blog Main

Microsoft Windows Vista is officially dead.

Not that it had much love in the first place, nor that you’ll find many people still using Windows Vista, but as Microsoft released the Windows 10 creators update on Tuesday, they have also officially ended support for Windows Vista. The operating system was first released back in 2007. And for the past 10 years,

Read More

Different RAID configurations and their benefits.

In a previous article, we explained the basics of what is RAID? and what the benefits are of using RAID configurations for your drives. We thought we’ll continue the theme and talk about the different RAID configurations out there. Not all RAID is equal. There are generally 6 different RAID configurations. 0,1,5,6 & 10. Each

Read More

What is RAID?

RAID stands for Redundant Array of Independent Disks It is typically associated with backup, but it is important to mention that it is not a backup solution in itself. People choose to configure their hard drives in RAID as it provides for better reliability and increases performance. RAID is where you have two or more

Read More

The 5 basic features of data backup

Backup, backup, backup… Being told to backup does get a little tiring after a while, but the advice is about as solid as ‘don’t eat yellow snow’. Seriously, though, what do you have in place to protect and recover irreplaceable files from corruption, deletion or theft?  We are always told to have a ‘plan b’,

Read More

You need a data back up plan

Data is important, right? We talk about securing your data, making sure your data is protected and away from prying eyes. But what about data backup? It’s hard to ignore the impact of technology on businesses in the 21st century. We’re now more reliant than ever on depending on these ‘mission critical’ services and infrastructure.

Read More

How SSH Works

In our previous article we talked about how SSL certificates work and how they are important authentication methods for indicating your connection to the site is secure. We also mentioned that it’s necessary to secure your connection to the server as well. SSH does exactly that.   SHH Secure Shell is a network protocol that

Read More

The importance of SSL and online security

Data security is important. In previous posts we’ve touched on topics such as securing your online accounts, securing your server and securing weaknesses from the inside, but what about securing your website? More specifically, the connection to your website? As websites are served to users, the information travels across a network computer to computer. In

Read More

The Journey to IPv6

Many of our customers will be aware that there are two sets if IP addressing conventions.  We thought it would be interesting to look at the history of this.   Lets jump back to 1983, the Internet was conceived and the first set of addresses were allocated. There are around 4.2 billion valid IPv4 addresses;

Read More
"