Cloud Computing Tutorials
-
How To Reset Your MySQL or MariaDB Root Password
-
How to Convert React Class Components into Functional Components using React Hooks
-
How To Allow Remote Access to MySQL
-
How to Install Node.js On Ubuntu 20.04
-
How To Secure Apache with Let’s Encrypt on Ubuntu 20.04
-
How to install WordPress with Ubuntu 20.04 and a LAMP Stack
-
How a Private Cloud is Crucial for Strategic Flexibility
-
Critical Disaster Recovery Mistakes to Avoid
-
VEXXHOST’s Announcements Recap
-
How to Simplify Package Version Management at Scale
-
VEXXHOST Introduces OpenStack Upgrades Offering
-
VEXXHOST Adds Support for UEFI Instance Booting
-
How to Ensure High Availability for Your Critical Databases
-
Could Application Technical Debt be Getting in Your way?
-
Managed Cloud Service: Explained
-
Introducing Minutely Billing To Our Public Cloud
-
Recap Of The First Open Infrastructure Summit
-
Announcing Our Kubernetes Enablement Offering
-
VEXXHOST Launches IPv6 in Santa Clara Region
-
VEXXHOST Is Running OpenStack Stein On Day One Of The Release
-
Meet VEXXHOST in Denver for the Open Infrastructure Summit
-
Security: Going Beyond Compliance
-
The VEXXHOST Approach to Application Modernization
-
Looking Forward With Multi-Cloud & Open-APIs
-
Infrastructure-As-Code 101
-
What To Consider When Choosing A Private Cloud
-
How To Setup Highly Available Web Servers with Keepalived & Floating IPs on Ubuntu 16.04
-
How To Deploy Python Web Applications with Bottle Micro Framework on Ubuntu 16.04
-
How To Securely Set Up Shipyard 2.0.10 with TLS on CoreOS
-
How To Run Nginx in a Docker Container on Ubuntu 16.04
-
Setup Continuous Integration Pipelines with GitLab CI on Ubuntu 16.04
-
Installing the Latest MySQL on Ubuntu 16.04
-
How To: Install Apache Server On Ubuntu 16.04
-
How to: Setup Cassandra & Run a Single-Node Cluster on Ubuntu 16.04
-
How To Install Elasticsearch 1.7, Logstash 1.5, & Kibana 4.1 (ELK Stack) on Ubuntu 14.04
-
How To Create a High Availability HAProxy Setup with Corosync, Pacemaker & Floating IPs on Ubuntu 14.04
-
How to Use Prometheus to Monitor Your CentOS 7 Server
-
How To Deploy a Hugo Site to Production with Git Hooks on Ubuntu 14.04
-
How to configure HTTP authentication with Nginx on Ubuntu 14.04
-
How to install, configure & use Jenkins on Ubuntu 14.04
-
How To Install & Use Hugo, the Static Site Generator, on Ubuntu 14.04
-
How to install IonCube Loaders on Ubuntu 14.04
-
How to install Elasticsearch on Ubuntu 14.04
-
How To Work with Docker Data Volumes on Ubuntu 14.04
-
How To Install and Use Docker Compose on Ubuntu 14.04
-
How to Deploy a Symphony Application to Production on Ubuntu 14.04
-
How To Install WordPress & PhpMyAdmin with Docker Compose on Ubuntu 14.04
-
How To Deploy a Clojure Web Application on Ubuntu 14.04
-
How to setup OpenVPN Server and Client on Ubuntu 14.04
-
How To Install & Setup Puppet Master and Client on Ubuntu 14.04
-
How to deploy a MariaDB Galera cluster on Ubuntu 14.04
-
How to Install and Use Docker on Ubuntu 14.04
-
How to install and use Logwatch on Ubuntu 14.04
-
How to use cron jobs for automation on Ubuntu 14.04
-
How to setup HHVM server on Ubuntu 14.04
-
How to install & configure WordPress 4.2.2 on CentOS 7
-
How To setup LAMP stack on CentOS 7
-
WordPress App on Ubuntu 14.04 LTS
-
How to Upload Custom Images with OpenStack
-
How to Setup OpenStack CLI Tools
-
Getting started with Docker in minutes using Docker Machine
-
MEAN & Socket.IO Integration Tutorial
-
Getting Started with MEAN Stack
-
Small Dive Into Meteor.JS
-
CentOS 6 to CentOS 7 Upgrade Procedure
-
How to Setup Remote System Logging with rsyslog on Ubuntu 14.04 LTS
-
10 Essential & Useful Ruby on Rails 4 Gems
-
10 Essential Laravel 4 Packages Everyone Should Use
-
Ruby on Rails vs. Laravel: Getting Started
-
How To Host Multiple Ghost Instances On A Single Server
-
How To Customize your Ghost Instance
-
How To Get Started with Apache libcloud & OpenStack
-
How To Install and Use EasyEngine (ee) on Ubuntu
-
How To Install & Host Ghost with Nginx on Ubuntu
-
How To Mitigate & Fix OpenSSL Heartbeat on CentOS or Ubuntu
-
How To Deploy Django on Nginx, Gunicorn with Postgres
-
How To Install GitLab As Your Private GitHub Clone
-
How To Configure a Galera Cluster with MariaDB on Ubuntu 12.04
-
How To Install FreePBX on CentOS
-
How To Install & Configure Varnish with Apache on Ubuntu
-
How To Install Linux, Nginx, MySQL, PHP (LEMP) stack on Ubuntu
-
How To Install an Upstream Version of Node.js on Ubuntu
-
How To Create a SSL Certificate on Nginx for Ubuntu
-
How To Set Up a Minecraft Server on Linux
-
How To Install Linux, Apache, MySQL, PHP (LAMP) stack on Ubuntu
-
How to protect your SSH server with Fail2Ban on Ubuntu
-
How To Install Rails & Nginx with Passenger on Ubuntu
-
How To Setup Your Own VPN With PPTP on Linux (CentOS, Ubuntu, Debian)
-
How To Set Up Nginx Virtual Hosts on Ubuntu
-
How to add extra swap space on CentOS 6
-
How To Install and Setup Postfix on Ubuntu
-
How To Setup VNC For Ubuntu
-
How To Setup SSH Keys
-
How to Install Git on Ubuntu
-
How to Add Swap on Ubuntu
-
How To Install Ruby on Rails on Ubuntu
-
Fixing 403 Forbidden Nginx Errors
-
Installing Latest Node.js on Ubuntu
-
Nginx Windows: How to Install
-
WordPress Performance Tip: Controlling Cronjobs
-
How To Reset Your MySQL or MariaDB Root Password
Reviews
Useful Links- Comparing the Speed of VM Creation and SSH Access of Cloud Providers - DZone Cloud
- Vexxhost in Canada
- OpenStack Launches Vendor Certification, Federated Identity Support From Over 30 Cloud Providers | TechCrunch
- Public Cloud Compare
- Cloudsoft AMP + VEXXHOST: A Success Story | Cloudsoft
- Comparing the speed of VM creation and SSH access of cloud providers
- Running CoreOS Container Linux on VEXXHOST
- Cloud Computing Review
- Big Data on OpenStack
- Connect Vexxhost cloud service to your Mac
Categories
Resources
Tag Archives: Security
3 Tips for Making Better Investments in Security
Information security’s role is becoming more strategic, but its approach to making investment decisions hasn’t kept pace. To better align security investments with enterprise strategy, IT and security leaders must stay focused on the right risks, add rigor to decision … Continue reading
Comments Off on 3 Tips for Making Better Investments in Security
iCloud security: How (and why) to enable two-factor authentication
Given that so many of the details of our digital lives are either with us (on our smartphones) or easily accessible (via the web), you should be doing everything you can to protect that information and data. On iPhones and … Continue reading
IDG Contributor Network: Cloud security: Trends and strategy
Cloud computing can generate mixed feelings. Corporate leaders generally welcome technologies that produce efficiency, agility and speed. Cloud services deliver those benefits, yet many are concerned about security, even while being often uninformed about how widely the cloud is used … Continue reading
Monitor cloud services for compliance, security from a single view
Moving to the cloud is supposed to reduce the headaches for IT administrators, but often it has the opposite effect of increasing their workload, especially around security and visibility. Not only do they have to make sure on-premises systems adhere … Continue reading
The 2 cloud security myths that must die
There seem to be two groups of people out there when it comes to cloud security: There are those who believe that public clouds are systemically unsafe, and those who believe clouds are impenetrable. They’re both wrong. Both of these … Continue reading
The barrier to cloud security isn’t the technology
You want solid cloud security, so you work to find the best approach and technology. But that won’t get the job done. The truth is that competent cloud security technology is available, and most IT organizations’ cloud teams are good … Continue reading
N.C. wind farm goes live despite legislators’ claims it’s a national security threat
The first utility-scale wind farm in North Carolina is now fully operational even though the state’s top politicians wanted President Donald Trump to nix the $ 400 million project because they said it’s a national security threat. Avangrid Renewables today announced … Continue reading
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions … Continue reading
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions … Continue reading
Security tops app services priority list
Security, not availability, is now the number one priority driving the adoption of application services, according to a new report by F5 Networks. Applications are becoming core to the digital economy, and organizations are increasingly turning to application services to … Continue reading
IDG Contributor Network: Will networks and security converge in 2017?
Bold predictions are in order at this time of year. Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like … Continue reading
IT Priorities Shifting Toward Security, Managing Costs
IDG survey shows renewed concern for operational security and improved customer experience. InformationWeek: Cloud
To solve IoT security, look at the big picture, ARM says
The recent DDoS attacks launched from IoT devices demonstrate that the internet of things spans all parts of IT and that most companies deploying it still need a lot of help. That’s the message from ARM, the chip design company … Continue reading
To solve IoT security, look at the big picture, ARM says
The recent DDoS attacks launched from IoT devices demonstrate that the internet of things spans all parts of IT and that most companies deploying it still need a lot of help. That’s the message from ARM, the chip design company … Continue reading
VMworld: Security, Network, Cloud Are Top IT Concerns
At VMworld 2016 in Las Vegas, customers of VMware took to the keynote stage to talk about adapting their data centers through changing times, with virtualization and vCloud Air. InformationWeek: Cloud
Cisco to cut 5,500 workers in refocus on IoT, security and cloud
Cisco Systems plans to lay off about 7 percent of its global workforce in a restructuring that will see it further focus on hot IT areas such as the internet of things, security, collaboration, next-generation data centers, and the cloud. … Continue reading
9 Promising Cloud Security Startups To Watch
The future belongs to cloud computing, but only with the help of strong security. Here are 9 cloud security startups IT managers may want to consider. InformationWeek: Cloud
5 ways Microsoft has improved SharePoint security
“Users will always find a way to get their job done. And if security gets in their way, they will find another, likely less secure, way to get their job done.” To read this article in full or to leave … Continue reading
7 Ways Cloud Computing Propels IT Security
A spate of high-profile public and private cloud security breaches is helping to push advancements in security such as encryption. Here’s a look at 7 ways the cloud may be the largest driver of IT security today. InformationWeek: Cloud
Intermountain Healthcare Balances IoT Adoption And Security Vigilance
Intermountain, a Salt Lake City healthcare provider, innovates with Internet-connected patient devices, but clamps down on security exposures when it sees them. InformationWeek: Cloud
IT is getting cloud storage security all wrong
A pair of research reports on cloud storage behaviors reiterates what has been an enduring and entirely unnecessary reality about data storage: The greatest threat to your store is not outside hackers, it’s your own staff. The first comes from … Continue reading
Microsoft strengthens security tools for Azure, Office 365
Microsoft has enhanced the holistic agile security platform it touted last November with integrated insights obtained from the company’s intelligent security graph and tighter collaboration with industry partners. The changes highlight Microsoft’s current approach to enterprise security, which focuses on … Continue reading
Cloud security is good, but here’s how to make it better
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. More than a third of businesses in the United States currently use the cloud, but by 2020 that … Continue reading
Microsoft strengthens security tools for Azure, Office 365
Microsoft has enhanced the holistic agile security platform it touted last November with integrated insights obtained from the company’s intelligent security graph and tighter collaboration with industry partners. The changes highlight Microsoft’s current approach to enterprise security, which focuses on … Continue reading
Microsoft adds new security enhancements to its cloud offerings
Microsoft is adding a range of new security management and reporting features to its Office 365 and Azure cloud services as part of the company’s holistic approach to enterprise security announced last year. In April, the company will release a … Continue reading
IBM unveils z13s mainframe focused on security and hybrid clouds
IBM has unveiled its new z13s mainframe, which it claims offers encryption at twice the speed as previous mid-range systems, without compromising performance The company, which sold its x86 server business to Lenovo, continues to invest in new designs of … Continue reading
Docker Tightens Security Over Container Vulnerabilities
Docker unveils three ways to make containers more secure, especially when code is changed during its update cycle. InformationWeek: Cloud
Microsoft improves security for Azure SQL Database
Microsoft is giving database administrators working with Azure SQL Database a new suite of security tools to check out. A new Always Encrypted feature will be available as a public beta by the end of the month. It allows users … Continue reading
Windows 10 Security, Exchange Server 2016: Microsoft Roundup
Microsoft sheds some light on its Windows 10 security policies, releases Exchange Server 2016, and plans its flagship store openings. InformationWeek: Cloud
Government cloud adoption efforts lag as security concerns persist
When the Obama administration’s CIO declared that the government would move to a cloud-first policy for its technology procurements, it was sending a clear message that agencies would be expected to modernize their IT shops. But five years later, that … Continue reading