BLOG

Build A Private Cloud With A VPS And Open Source Software

SaaS platforms are convenient and inexpensive: that’s why they are so popular with small businesses. But entrusting a business’s data to a service managed by a third-party is not without drawbacks.

  • Privacy and security. Data is hosted on a platform that is not controlled by the business, which has no insight into the platform’s security or privacy.
  • Consistency. SaaS businesses are often bought and sunsetted. They frequently pivot in a direction that is not beneficial to users.
  • Portability. A business should be free to take its data where it pleases, but it is not in the interest of SaaS vendors to make that easy.

Tmux Is A Server Administration Essential

Tmux is a terminal multiplexer. That might not sound particularly interesting, but it is one of the most useful programs in the server administrator’s toolbox. A terminal multiplexer can split a terminal window into multiple windows, each of which runs a shell.

Use Bash’s History Features For Command Line Efficiency

Bash, the shell that CentOS users interact with on the command line, is almost 30 years old. As a text-only interface, it has, over the years, developed many small conveniences for making the process of entering, recalling, and editing commands as efficient as possible. Among the most useful is Bash’s command history.

What’s New In MySQL 8?

Earlier this year, MySQL 8.0  was released. It’s a big release with a host of new features, performance improvements, and stability enhancements.

Before we dig into what is new in MySQL 8, MySQL users might be wondering what happened to MySQLs 6 and 7. The most recent stable version is MySQL 5.7.

How Involved Should Your Executives Be In Cybersecurity?

As the traditional belief goes, cybersecurity isn’t really the bailiwick of a business’s executive board. It’s something that’s to be handled by your IT department. They’re the ones with the necessary expertise to keep your data, applications, and systems protected against all manner of cybercrime.

Digging Through The Hype of AI-Based Cybersecurity

It’s a battle that’s played out inside our bodies ever since the first human being set foot on earth. Viruses and bacteria attempt to force their way into our bodies, where they can multiply and wreak havoc. Our bodies, meanwhile, have multiple defenses for dealing with these invaders – from the outer layer that is our skin to our internal immune systems.