Posts Categorized: General

The rise of M-Commerce

The modern technological world can easily assist innovative minds to explore new horizons. “World at your fingertips’ is perhaps an apt way to put it candidly. When it comes to internet, then sky is the limit. Food, apparels, electronics, utensils and practically anything, which is required in day to day life, is available at just… Read more »

Startup Companies focus on Open Source Techniques

Earlier, IT companies used to endure high initial costs to run operating systems. Even though pirated versions were available, the original versions were absolutely necessary as it was illegal to use pirated versions. Majority of the companies relied on Microsoft Windows as their operating systems and essential IT products like MS Office, SQL database etc…. Read more »

Securing the enterprise workspace with BYOD

BYOD brings with it a revolutionary transformation of end-user workspaces. It unshackles practices like employees tied to a physical location and specifications like rigidly configured devices, OS, applications and user states. It simply allows users to work from anywhere, accessing applications and content using myriad device configurations. In short, the benefits offered by BYOD make… Read more »

How to limit the CPU usage by a Linux process ?

Multi-tasking ability and faster response time are the most attractive features of Linux machines. Still some tasks may overburden the CPU and contribute to sluggish performance of machines. From running MySQL process to back up, the CPU is getting utilised in full. It is fine, if the machine is not engaged in any other processes or… Read more »

Server Monitoring Tools

In real time environment, optimising the performance of the servers holds the key. In order to enhance the performance of the servers it is important to know related information about the system like CPU utilization, memory usage, network, disk I/O etc. In other words, it is essential to monitor these factors 24 x 7. High… Read more »

Secured Socket Layer (SSL) and related Vulnerabilities

Secured Socket Layer, more commonly called as SSL, is a protocol in which data is transferred in an encrypted format to ensure security. This data transfer between client and the server is established with the help of certificates. SSL certificate is an absolute necessity for e-commerce sites as end users need to submit critical information… Read more »

Dangerous commands on Linux

As Linux servers are handled using commands, the following points should be taken note of while executing certain commands that could be potentially destructive. These commands should be used only after careful analysis. Test the performance of these commands on a test environment, so that you could understand how it would affect the server performance… Read more »

Prevent your server from being hacked

Millions of websites are being hacked every day at different corners of the globe. Another million websites are prone to be a victim of this unfair phenomenon. A callous approach in maintaining the servers is the chief reason for hacking. The following are some ways by which hacking can be controlled to a great extent.

How to speedup Word Press websites

Among the most popular tools for websites based on Content Management System, Word Press has established itself as one of the leaders. As of August 2013, Word Press is used by more than 22% of the top 10 million websites. Also it is the most popular blogging system in use, in more than 60 million… Read more »