Category: Technical

  • 3 Signs that Your Server Needs Upgrading

    3 Signs that Your Server Needs Upgrading

    A company server failing can be disastrous, especially if it’s a web server and one that generates sales for the company, but it’s equally damaging if it’s an intranet server, as the cost to the business could prove to be massive. Server failure can lead to downtime for the entire business; if employees can’t access […]

  • Why Choose a Data Center to Host your Servers? Part 2

    Code Project Cont’d from Why Choose a Data Center to Host your Servers? Quality of Service Companies do not often upgrade their server hardware and this means that most businesses are seldom running the latest equipment, or utilizing cutting edge technology. DCs must use current, quality hardware in order to stay competitive. So a virtual […]

  • Why Choose a Data Center to Host your Servers?

    Why Choose a Data Center to Host your Servers?

    More businesses than ever before are now deciding to use Data Centers (DCs) to host their servers. Servers are crucial pieces of equipment. They are the heart of any business’s computer network, often loaded with unique, custom software and programs, and holding sensitive and critical data that a business needs in order to operate. So […]

  • Dell PowerEdge 2950: Quieting the Loud Fans! Part 2

    Cont’d from Dell PowerEdge 2950 Server: Quieting the Loud Fans!   When you have successfully placed the shrink tubes and soldered all the wires together, you should have something similar to the picture below now. You are now ready to fire up the grill lighter and shrink the tubes in place.       Heating […]

  • An Overview of the New Windows 8 Enterprise Edition – Part 2

    Cont’d from “An Overview of the New Windows 8 Enterprise Edition – Part 1” Faster Start-up This is something that will be welcomed by both users and employers alike. All previous versions of Windows take a seemingly long time to boot-up. It results in staff being unoccupied and bored, and to the employer, when multiplied […]

  • 3 Signs Your Web Server’s Security has been Compromised – Part 2

    Code Project Cont’d from “3 Signs that your Web Server’s Security has been Compromised” #2: Check-out the Admin Interfaces Most web applications have some sort of administrative interface. These can be used as an ideal way of allowing hackers into your system. Hackers are often able to manipulate any inherent weaknesses when it comes to […]

  • Preparing a Disaster Recovery Plan for your Business – Cont’d

    …cont’d from “How to Prepare a Disaster Recovery Plan (DRP) for your Business” Gaining Board Approval If the person compiling the DRP is not the owner of the business, then the owner’s approval and consent must be sought and gained. Whilst the IT professional will take into account all of the operational issues, things like […]

  • How to Prepare a Disaster Recovery Plan (DRP) for your Business

    How to Prepare a Disaster Recovery Plan (DRP) for your Business

    In the same way that formulating a business plan is essential when thinking of starting up a new business, formulating a disaster recovery plan (DRP) is essential once your IT infrastructure is in place, especially if you deal with data that requires auditing (such as customer credit card details, for example). The Basic Steps in […]

  • How to Choose the Best Antivirus Software for Your Situation

    How to Choose the Best Antivirus Software for Your Situation

    The Internet is littered with malware, viruses, trojans and other malicious pieces of software that could really ruin your day. That means it doesn’t matter if you’re a gamer or someone who uses an old family PC for browsing the web and checking email, you still need some sort of antivirus to keep yourself safe. […]

  • How Monitoring Software can Help to Protect Against CryptoLocker

    How Monitoring Software can Help to Protect Against CryptoLocker

    If you spend a lot of time online, are pretty tech savvy or are in the technology sector, then there’s little doubt that you’ve come across the term ransomware here and there. In a nutshell, ransomware is a type of malware that infects a computer and effectively puts up a lock screen that holds the […]