14
Dec
Cloud Computing in 2011
1
We are in December and we have seen a lot of discussions on Cloud Computing, I believe that a short summary of what is in... Read More
13
Dec
Cloud Computing and Open Source
Does Cloud Computing and SaaS concept undermines the Open Source model? In my opinion, SaaS and open source are complementary and not competitors. Let us... Read More
11
Dec
Mashup (Hybrid Web Application)
A MASHUP is web application that uses content from more than one source to create a new full service. Content used in mashups is typically... Read More
11
Dec
Hardware Firewall Vs Software Firewall
Connecting your network to the Internet without a firewall is like leaving the front door of your office wide open when you leave on vacation.... Read More
10
Dec
cPanel or Plesk: Advantages And Disadvantages To Consider When Choosing The Control Panel
The web developer generally knows and is familiar with the variety of hosting control panels. Control Panels, accordingly, are web-based platform which aims to simplify... Read More
10
Dec
Best FTP Software – File Transfer Protocol
FTP software facilitates fast and secure transfers of files, especially large or complex files like images, video or private (encrypted) files. Transferring large image files... Read More
10
Dec
Port Security – Configuring and Monitoring Port Security
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed... Read More
09
Dec
Compress The Database in SQL Server 2008
In SQL Server 2008, there is the possibility to compress the data stored in the database. Compression can give a good performance gain for those... Read More
09
Dec
All About Ready Server
Let us assume that you downloaded the ready server. Satisfied unpacked the archive, and then came the question, what to do next? There are 2... Read More
09
Dec
Steps to Secure VPS Hosting
Following are the steps to Secure VPS Hosting: Firewall Installation Installing firewall and various other related tools such as CSF, sim. These will prevent unauthorized... Read More