Tag: data storage

  • How to Manage Linux Logs

    How to Manage Linux Logs

    By Des Nnochiri   Log files in Linux often contain information that can assist in tracking down the cause of issues hampering system or network performance. If you have multiple servers or levels of IT architecture, the number of logs you generate can soon become overwhelming. In this article, we’ll be looking at some ways […]

  • How to Prepare Your Staff for Hybrid Cloud

    How to Prepare Your Staff for Hybrid Cloud

    By Des Nnochiri   Budgetary constraints are often a key factor in determining how an organization sets up its IT infrastructure. The hybrid cloud typically leads to cost savings of between 5% and 30% for enterprises that make the transition. Besides the monetary aspects, performance benefits and easier administration also inspire many organizations to consider […]

  • Top 3 Reporting Software of 2019

    Top 3 Reporting Software of 2019

    By Des Nnochiri   Reporting software is a part of a Business Intelligence or BI suite and is used for analysis in early data processing. The purpose of self-service reporting software is to help deliver interactive information that can be put into action. Self-service reporting software allows the user to connect data sources, extract data […]

  • When Should You Host Applications Onsite?

    When Should You Host Applications Onsite?

    By Des Nnochiri   When it comes to hosting applications, business and IT administrators often need to make tough decisions as to whether cloud hosting or retention of the software at their own data center is the preferred option. Public cloud hosting may have the edge in terms of scale and distribution, but there are […]

  • Identifying Duplicate Files in Linux

    Identifying Duplicate Files in Linux

    By Des Nnochiri   Keeping redundant copies of essential files and programs can assist in recovery when system glitches or other incidents occur. However, duplicate files also hold the potential to confuse matters and introduce errors. It’s possible to have too much of a good thing, so keeping track of these duplicates is always a […]

  • Using OneDrive in Windows 10

    Using OneDrive in Windows 10

    By Des Nnochiri   For Windows 10 users, Microsoft’s OneDrive cloud storage can add critical backup, sync, and file-sharing capabilities to personal desktops or business networks. In this guide, we offer some recommendations on getting the most out of the service.   OneDrive Basics   A built-in component of Windows 10, OneDrive can back up […]

  • Best Security Practices for Enterprise IoT

    Best Security Practices for Enterprise IoT

    By Des Nnochiri   Internet of Things (IoT) security ranks as a major concern for many enterprises. A 2018 survey of over 600 IT decision-makers worldwide conducted by 451 Research found that 55% of those polled rated IoT security as their top priority. It’s easy to see why. As well as any “smart, connected” devices […]

  • Cyber Security in the Movies – Is It Realistic?

    Cyber Security in the Movies – Is It Realistic?

    By Des Nnochiri   Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security […]

  • A Quick Guide to Encrypted Messaging

    A Quick Guide to Encrypted Messaging

    By Des Nnochiri   With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we’re going on holiday and where, and send and receive risqué photos. However, when it became public knowledge that the NSA, internet service providers, and trusted […]

  • 7 Cyber Security Tips for Small Businesses

    7 Cyber Security Tips for Small Businesses

    Protecting your data, and that of your clients, should be central to all of your business practices. Customers entrust companies with often very sensitive data, and it should be used and stored safely. Cyber security should be a priority in companies of any size, but when you’re a small business without a big security budget, […]