Guides Telnet explained Computer and server management is a tricky task, especially when you don't have direct access to the system itself. For this reason, IT administration and support tools that facilitate remote connections are incredibly popular. These tools allow you to connect to and... read more
Guides Traceroute explained The internet is a massive interlinked network of personal computers and servers. This is where the name World Wide Web (www) comes from, with many individual systems interconnected in a web-like structure. In some cases, however, these connections can fail and cause network outages.... read more
Guides Upgrading to PHP 7 Programming languages are used to create all the software we use, and the web is no exception. The most commonly used web languages are HTML, CSS, and our topic of the day: PHP. Hypertext Preprocessor (or PHP) is a server-side language, and allows users... read more
Cloud The effect of big-name data breaches on cyber security Recently we came across a website which visualises mass data sets into interactive charts called Information is Beautiful [https://informationisbeautiful.net/]. One chart that caught our eye was ‘ World’s... read more
Cloud The advantages of SSD hard drive storage Is the SSD tide turning? More importantly, are SSDs worth it? Just a few years ago, solid-state drives, or SSDs, were seen as cutting-edge solutions with price tags to match,... read more
Security The human aspect of cyber security Attackers are developing bigger, scarier, and more complex viruses every day. Increasingly however, the biggest part of cyber security that businesses should be wary of is the human aspect. Companies... read more
Servers LAMP stack or MEAN stack? Let’s compare In web development, no one can argue that web stacks aren't vital to keeping things running as they should. The increasing demand for seamless technology that extends across... read more
Cloud How to plan for your cloud migration Ready to move your data to the cloud? Migrating to a new cloud infrastructure might seem like a daunting task, but with the right preparation and coordination, it really shouldn’... read more
Business Magento vs WooCommerce Each accounting for roughly 30 percent of all ecommerce websites, Magento and WooCommerce are both incredibly popular. For anyone looking to build and maintain an online shop, these platforms are... read more
Business The data breach capital of the UK Data breaches are constantly on the rise, and cybersecurity is an ever-evolving battle. In the UK in 2019, almost a third of UK businesses identified cyber security breaches – and it... read more
Cloud ECC RAM: keeping critical data error-free Big data is only getting bigger. As more organisations rely on ballooning volumes of information, the accuracy and integrity of data have become more important than ever. Whenever data is... read more
Security What is a grey hat hacker? Where white hat hackers work alongside organisations and take part in things like bug bounty programs [https://www.fasthosts.co.uk/blog/bug-bounty-programs-and-white-hat-hackers/], there's another type of hacker... read more
Digital Relational vs non-relational databases Databases are the core of any business or project in some form. Whether your business deals with data from customers, or simply generates its own big data during operation, making... read more