Welcome to
Life at ESDS

ESDS Blogs and Accolades

Discover a world of possibilities. Explore our blog for expert insights, industry trends, and best practices.

11
Dec

Mashup (Hybrid Web Application)

A MASHUP is web application that uses content from more than one source to create a new full service. Content used in mashups is typically code from a third party through a public interface or API . Other methods of encoding content for mashups include Web feeds (eg RSS or Atom ), Javascript and widgets...
Read More
11
Dec

Hardware Firewall Vs Software Firewall

Connecting your network to the Internet without a firewall is like leaving the front door of your office wide open when you leave on vacation. Chances are high that someone will eventually walk in and steal your valuables. A firewall is a barrier that is placed in between your computer and other computers that may...
Read More
10
Dec

Best FTP Software – File Transfer Protocol

FTP software facilitates fast and secure transfers of files, especially large or complex files like images, video or private (encrypted) files. Transferring large image files through email is cumbersome and moving medical files electronically requires HIPPA compliance, FTP software speeds up large transfers and employs HIPPA compliant security protocols. FTP, or File Transfer Protocol, is...
Read More
09
Dec

Compress The Database in SQL Server 2008

In SQL Server 2008, there is the possibility to compress the data stored in the database. Compression can give a good performance gain for those databases whose size is much larger than the server’s memory and as a consequence, the server is experiences a substantial load on the disk system. Efficient use of disk in...
Read More
09
Dec

All About Ready Server

Let us assume that you downloaded the ready server. Satisfied unpacked the archive, and then came the question, what to do next? There are 2 ways to start a ready server. Simple, but it consumes more system resources, and complex, the server starts in console mode, which is correspondingly less, “eats” your system resources. We...
Read More
09
Dec

Steps to Secure VPS Hosting

Following are the steps to Secure VPS Hosting: Firewall Installation Installing firewall and various other related tools such as CSF, sim. These will prevent unauthorized access to your server and from brute force attacks. CSF (ConfigServer Firewall) http://www.configserver.com/free/csf/install.txt SIM (System Integrity Monitor) http://www.rfxnetworks.com/sim.php NSIV (Network Socket Inode Validation) http://www.rfxnetworks.com/nsiv.php LES (Linux Environment Security) http://www.rfxnetworks.com/les.php these...
Read More
04
Dec

What To do if VMware Host Or VMs Hangs or Freezes?

This is another issue bothering cloud hosting administrators and it can occur with the VM or the host levels. It usually happens when the virtual machines are switched on or rebooted. You should first check whether the host console has remained inactive for a long time to cause the hang. * Ping the host or...
Read More