Systems Can Be Attacked Via NTP Flaws

Systems Can Be Attacked Via NTP Flaws

At least three serious vulnerabilities in the Network Time Protocol (NTP) have been uncovered by security researchers at Google in 2014. This is quite serious because of the sheer number of computers that may potentially be targets of DDoS (click here to read earlier...

read more
Who Needs an Intrusion Detection System?

Who Needs an Intrusion Detection System?

Intrusion detection systems (also called ID systems and IDS) have been, and are still constantly being developed in response to past and present attacks on many high-profile websites and networks, including those of Sony, eBay, Yahoo Mail, Google, Apple iCloud, UPS,...

read more
Here Comes the Anti-DDoS Appliance

Here Comes the Anti-DDoS Appliance

"More creative and varied", this is how Brad Casemore describes the current nature of DDoS attacks in a recent article in the TechTarget website. Casemore, who is research director at International Data Corporation (IDC), said that the burden is on the shoulders of IT...

read more
Big Data Analytics with Apache Hive

Big Data Analytics with Apache Hive

A few posts back, we encountered the evolving term big data which describes gigantic mass of data that big business enterprises are eyeing to mine for whatever value can be obtained from the data. Examples of big data may be found in the unimaginable collection of...

read more
Did Cisco Migrate to Active Directory?

Did Cisco Migrate to Active Directory?

Yes. Cisco Systems, the dominant giant in the networking equipment industry, migrated to Active Directory. But before we look into the why or how of this story, let’s have a little background on Active Directory and on Cisco. Active Directory Active Directory (AD),...

read more
Benefits of Application Virtualization

Benefits of Application Virtualization

Many layers of virtualization are currently at work, and one of them is application virtualization. Application virtualization is software technology that implements the encapsulation of an application so that it can be isolated from its host OS. The resulting...

read more
Meet the Hypervisor

Meet the Hypervisor

A user doing daily routine work in front of a virtualized system may not be aware of the fact that there is some “illusion” taking place right before his eyes. He may be running Linux applications one moment and Windows applications the next while using exactly the...

read more
Bright and Dark Spots of BYOC

Bright and Dark Spots of BYOC

It never fails. For every gain in technology there is always a matching specter of loss close by. For every capability, a hindrance. For every moment of celebration, a cause for regret. There are currently spectacular advances in IT brought about by such technologies...

read more
Storage Modernization – the HP Solution

Storage Modernization – the HP Solution

At the expense of legacy data centers focused on applications, many IT organizations are joining the recent bandwagon headed for virtualization and enticing cloud offerings like ITaaS (IT as a service) that have taken center stage in current technology...

read more
Virtualization for Your Business

Virtualization for Your Business

If your business success relies much on networked IT resources, it’s good to consider virtualization. With virtualization you can abstract applications and as well as their related components away from the supporting hardware, and you can get a virtual (logical)...

read more

Subscribe For Instant Updates

 

Want to be kept in the loop of our news and NOC? Subscribe to our mailing list. We do not send a mail frequent, only when we really have something to report.

 

Coming soon…

Sorry, Hosting services are currently all sold out.

 

We expect to have more clustered servers available after Q2 of 2020, If you need any advice, or want to purchase your own equipment please contact us.