Cloud Computing Tutorials
-
How a Private Cloud is Crucial for Strategic Flexibility
-
Critical Disaster Recovery Mistakes to Avoid
-
VEXXHOST’s Announcements Recap
-
How to Simplify Package Version Management at Scale
-
VEXXHOST Introduces OpenStack Upgrades Offering
-
VEXXHOST Adds Support for UEFI Instance Booting
-
How to Ensure High Availability for Your Critical Databases
-
Could Application Technical Debt be Getting in Your way?
-
Managed Cloud Service: Explained
-
Introducing Minutely Billing To Our Public Cloud
-
Recap Of The First Open Infrastructure Summit
-
Announcing Our Kubernetes Enablement Offering
-
VEXXHOST Launches IPv6 in Santa Clara Region
-
VEXXHOST Is Running OpenStack Stein On Day One Of The Release
-
Meet VEXXHOST in Denver for the Open Infrastructure Summit
-
Security: Going Beyond Compliance
-
The VEXXHOST Approach to Application Modernization
-
Looking Forward With Multi-Cloud & Open-APIs
-
Infrastructure-As-Code 101
-
What To Consider When Choosing A Private Cloud
-
Deep Dive On Disaster Recovery
-
Reasons To Take Advantage Of Cloud-Based Data Warehouses
-
Debunking Common Open Source Myths
-
Cloud Pricing 101: Public vs. Private
-
The Top Cloud Computing Challenges Faced By All Industries
-
Private Clouds & The Cloud Ecosystem
-
How To Set Up Highly Available Web Servers with Keepalived and Floating IPs on Ubuntu 16.04
-
How To Deploy Python Web Applications with the Bottle Micro Framework on Ubuntu 16.04
-
How To Securely Set Up Shipyard 2.0.10 with TLS on CoreOS
-
How To Run Nginx in a Docker Container on Ubuntu 16.04
-
Setting Up Continuous Integration Pipelines with GitLab CI on Ubuntu 16.04
-
Installing the Latest MySQL on Ubuntu 16.04
-
How to Install Apache Server On Ubuntu 16.04
-
How To setup Cassandra and run a Single-Node Cluster on Ubuntu 16.04
-
How To Install Elasticsearch 1.7, Logstash 1.5, and Kibana 4.1 (ELK Stack) on Ubuntu 14.04
-
How To Create a High Availability HAProxy Setup with Corosync, Pacemaker, and Floating IPs on Ubuntu 14.04
-
How to Use Prometheus to Monitor Your CentOS 7 Server
-
How To Deploy a Hugo Site to Production with Git Hooks on Ubuntu 14.04
-
How to configure HTTP authentication with Nginx on Ubuntu 14.04
-
How to install, configure and use Jenkins on Ubuntu 14.04
-
How To Install and Use Hugo, the Static Site Generator, on Ubuntu 14.04
-
How to install IonCube Loaders on Ubuntu 14.04
-
How to install Elasticsearch on Ubuntu 14.04
-
How To Work with Docker Data Volumes on Ubuntu 14.04
-
How To Install and Use Docker Compose on Ubuntu 14.04
-
How to Deploy a Symfony Application to Production on Ubuntu 14.04
-
How To Install WordPress and PhpMyAdmin with Docker Compose on Ubuntu 14.04
-
How To Deploy a Clojure Web Application on Ubuntu 14.04
-
How to setup OpenVPN Server and Client on Ubuntu 14.04
-
How To Install & Setup Puppet Master and Client on Ubuntu 14.04
-
How to deploy a MariaDB Galera cluster on Ubuntu 14.04
-
How to Install and Use Docker on Ubuntu 14.04
-
How to install and use Logwatch on Ubuntu 14.04
-
How to use cron jobs for automation on Ubuntu 14.04
-
How to setup HHVM server on Ubuntu 14.04
-
How to install and configure WordPress 4.2.2 on CentOS 7
-
How To setup LAMP stack on CentOS 7
-
WordPress App on Ubuntu 14.04 LTS
-
How to Upload Custom Images with OpenStack
-
How to Setup OpenStack CLI Tools
-
Getting started with Docker in minutes using Docker Machine
-
MEAN & Socket.IO Integration Tutorial
-
Getting Started with MEAN Stack
-
Small Dive Into Meteor.JS
-
CentOS 6 to CentOS 7 Upgrade Procedure
-
How to Setup Remote System Logging with rsyslog on Ubuntu 14.04 LTS
-
10 Essential & Useful Ruby on Rails 4 Gems
-
10 Essential Laravel 4 Packages Everyone Should Use
-
Ruby on Rails vs. Laravel: Getting Started
-
How to host multiple Ghost instances on a single server
-
How To Customize your Ghost Instance
-
How To Get Started with Apache libcloud and OpenStack
-
How To Install and Use EasyEngine (ee) on Ubuntu
-
How To Install & Host Ghost with Nginx on Ubuntu
-
How to mitigate and fix OpenSSL Heartbeat on CentOS or Ubuntu
-
How To Deploy Django on Nginx, Gunicorn with Postgres
-
How To Install GitLab As Your Private GitHub Clone
-
How To Configure a Galera Cluster with MariaDB on Ubuntu 12.04
-
How To Install FreePBX on CentOS
-
How To Install and Configure Varnish with Apache on Ubuntu
-
How To Install Linux, Nginx, MySQL, PHP (LEMP) stack on Ubuntu
-
How To Install an Upstream Version of Node.js on Ubuntu
-
How To Create a SSL Certificate on Nginx for Ubuntu
-
How To Set Up a Minecraft Server on Linux
-
How To Install Linux, Apache, MySQL, PHP (LAMP) stack on Ubuntu
-
How to protect your SSH server with Fail2Ban on Ubuntu
-
How To Install Rails and Nginx with Passenger on Ubuntu
-
How To Setup Your Own VPN With PPTP on Linux (CentOS, Ubuntu, Debian)
-
How To Set Up Nginx Virtual Hosts on Ubuntu
-
How to add extra swap space on CentOS 6
-
How To Install and Setup Postfix on Ubuntu
-
How To Setup VNC For Ubuntu
-
How To Setup SSH Keys
-
How to Install Git on Ubuntu
-
How to Add Swap on Ubuntu
-
How To Install Ruby on Rails on Ubuntu
-
Fixing 403 Forbidden Nginx Errors
-
Installing Latest Node.js on Ubuntu
-
Nginx Windows: How to Install
-
WordPress Performance Tip: Controlling Cronjobs
-
How a Private Cloud is Crucial for Strategic Flexibility
Reviews
Useful Links
- Comparing the Speed of VM Creation and SSH Access of Cloud Providers - DZone Cloud
- Vexxhost in Canada
- OpenStack Launches Vendor Certification, Federated Identity Support From Over 30 Cloud Providers | TechCrunch
- Public Cloud Compare
- Cloudsoft AMP + VEXXHOST: A Success Story | Cloudsoft
- Comparing the speed of VM creation and SSH access of cloud providers
- Running CoreOS Container Linux on VEXXHOST
- Cloud Computing Review
- Big Data on OpenStack
- Connect Vexxhost cloud service to your Mac
Categories
Resources
- Lift and Shift Cloud Strategy
- Digital Transformation Through Cloud Automation
- Things To Consider When Adopting A Container Platform
- Virtual Machine or Bare Metal: which is better for Containers?
- Cloud Virtualization through Containers as a Service (CaaS)
- Why Should Containers Be A Part Of Your Hybrid Cloud Strategy?
- 3 (More) Ways To Improve Your Container Orchestration
- How To Benefit From Containerization With Kubernetes?
- How To Overcome Cloud Operation Complexities
- Turning To Cloud Computing & Orchestration For Business Success
Tag Archives: Security
3 Tips for Making Better Investments in Security
Information security’s role is becoming more strategic, but its approach to making investment decisions hasn’t kept pace. To better align security investments with enterprise strategy, IT and security leaders must stay focused on the right risks, add rigor to decision … Continue reading
Posted in Cloud Computing
Tagged better, Investments, Making, Security, tips
Comments Off on 3 Tips for Making Better Investments in Security
iCloud security: How (and why) to enable two-factor authentication
Given that so many of the details of our digital lives are either with us (on our smartphones) or easily accessible (via the web), you should be doing everything you can to protect that information and data. On iPhones and … Continue reading
Posted in Cloud Computing
Tagged Authentication, Enable, iCloud, Security, twofactor
Leave a comment
IDG Contributor Network: Cloud security: Trends and strategy
Cloud computing can generate mixed feelings. Corporate leaders generally welcome technologies that produce efficiency, agility and speed. Cloud services deliver those benefits, yet many are concerned about security, even while being often uninformed about how widely the cloud is used … Continue reading
Posted in Cloud Computing
Tagged Cloud, Contributor, network, Security, strategy, trends
Leave a comment
Monitor cloud services for compliance, security from a single view
Moving to the cloud is supposed to reduce the headaches for IT administrators, but often it has the opposite effect of increasing their workload, especially around security and visibility. Not only do they have to make sure on-premises systems adhere … Continue reading
Posted in Cloud Computing
Tagged Cloud, compliance, from, Monitor, Security, Services, Single, View'
Leave a comment
The 2 cloud security myths that must die
There seem to be two groups of people out there when it comes to cloud security: There are those who believe that public clouds are systemically unsafe, and those who believe clouds are impenetrable. They’re both wrong. Both of these … Continue reading
N.C. wind farm goes live despite legislators’ claims it’s a national security threat
The first utility-scale wind farm in North Carolina is now fully operational even though the state’s top politicians wanted President Donald Trump to nix the $ 400 million project because they said it’s a national security threat. Avangrid Renewables today announced … Continue reading
Posted in Cloud Computing
Tagged claims, despite, farm, Goes, It’s, legislators', live, N.C., national, Security, threat, wind
Leave a comment
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions … Continue reading
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions … Continue reading
IDG Contributor Network: Will networks and security converge in 2017?
Bold predictions are in order at this time of year. Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like … Continue reading
Posted in Cloud Computing
Tagged 2017, Contributor, converge, network, Networks, Security
Leave a comment
IT Priorities Shifting Toward Security, Managing Costs
IDG survey shows renewed concern for operational security and improved customer experience. InformationWeek: Cloud
Posted in Cloud Computing
Tagged costs, managing, Priorities, Security, Shifting, Toward
Leave a comment
To solve IoT security, look at the big picture, ARM says
The recent DDoS attacks launched from IoT devices demonstrate that the internet of things spans all parts of IT and that most companies deploying it still need a lot of help. That’s the message from ARM, the chip design company … Continue reading
To solve IoT security, look at the big picture, ARM says
The recent DDoS attacks launched from IoT devices demonstrate that the internet of things spans all parts of IT and that most companies deploying it still need a lot of help. That’s the message from ARM, the chip design company … Continue reading
VMworld: Security, Network, Cloud Are Top IT Concerns
At VMworld 2016 in Las Vegas, customers of VMware took to the keynote stage to talk about adapting their data centers through changing times, with virtualization and vCloud Air. InformationWeek: Cloud
Cisco to cut 5,500 workers in refocus on IoT, security and cloud
Cisco Systems plans to lay off about 7 percent of its global workforce in a restructuring that will see it further focus on hot IT areas such as the internet of things, security, collaboration, next-generation data centers, and the cloud. … Continue reading
9 Promising Cloud Security Startups To Watch
The future belongs to cloud computing, but only with the help of strong security. Here are 9 cloud security startups IT managers may want to consider. InformationWeek: Cloud
5 ways Microsoft has improved SharePoint security
“Users will always find a way to get their job done. And if security gets in their way, they will find another, likely less secure, way to get their job done.” To read this article in full or to leave … Continue reading
7 Ways Cloud Computing Propels IT Security
A spate of high-profile public and private cloud security breaches is helping to push advancements in security such as encryption. Here’s a look at 7 ways the cloud may be the largest driver of IT security today. InformationWeek: Cloud
Intermountain Healthcare Balances IoT Adoption And Security Vigilance
Intermountain, a Salt Lake City healthcare provider, innovates with Internet-connected patient devices, but clamps down on security exposures when it sees them. InformationWeek: Cloud
Posted in Cloud Computing
Tagged adoption, Balances, Healthcare, Intermountain, Security, Vigilance
Leave a comment
IT is getting cloud storage security all wrong
A pair of research reports on cloud storage behaviors reiterates what has been an enduring and entirely unnecessary reality about data storage: The greatest threat to your store is not outside hackers, it’s your own staff. The first comes from … Continue reading
Microsoft strengthens security tools for Azure, Office 365
Microsoft has enhanced the holistic agile security platform it touted last November with integrated insights obtained from the company’s intelligent security graph and tighter collaboration with industry partners. The changes highlight Microsoft’s current approach to enterprise security, which focuses on … Continue reading
Posted in Cloud Computing
Tagged Azure, Microsoft, Office, Security, Strengthens, tools
Leave a comment
Cloud security is good, but here’s how to make it better
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. More than a third of businesses in the United States currently use the cloud, but by 2020 that … Continue reading
Microsoft strengthens security tools for Azure, Office 365
Microsoft has enhanced the holistic agile security platform it touted last November with integrated insights obtained from the company’s intelligent security graph and tighter collaboration with industry partners. The changes highlight Microsoft’s current approach to enterprise security, which focuses on … Continue reading
Posted in Cloud Computing
Tagged Azure, Microsoft, Office, Security, Strengthens, tools
Leave a comment
Microsoft adds new security enhancements to its cloud offerings
Microsoft is adding a range of new security management and reporting features to its Office 365 and Azure cloud services as part of the company’s holistic approach to enterprise security announced last year. In April, the company will release a … Continue reading
Posted in Cloud Computing
Tagged adds, Cloud, enhancements, Microsoft, offerings, Security
Leave a comment
IBM unveils z13s mainframe focused on security and hybrid clouds
IBM has unveiled its new z13s mainframe, which it claims offers encryption at twice the speed as previous mid-range systems, without compromising performance The company, which sold its x86 server business to Lenovo, continues to invest in new designs of … Continue reading
Posted in Cloud Computing
Tagged Clouds, focused, Hybrid, mainframe, Security, Unveils, z13s
Leave a comment
Docker Tightens Security Over Container Vulnerabilities
Docker unveils three ways to make containers more secure, especially when code is changed during its update cycle. InformationWeek: Cloud
Posted in Cloud Computing
Tagged Container, Docker, over, Security, tightens, Vulnerabilities
Leave a comment
Microsoft improves security for Azure SQL Database
Microsoft is giving database administrators working with Azure SQL Database a new suite of security tools to check out. A new Always Encrypted feature will be available as a public beta by the end of the month. It allows users … Continue reading
Windows 10 Security, Exchange Server 2016: Microsoft Roundup
Microsoft sheds some light on its Windows 10 security policies, releases Exchange Server 2016, and plans its flagship store openings. InformationWeek: Cloud
Posted in Cloud Computing
Tagged 2016, Exchange, Microsoft, Roundup, Security, Server, Windows
Leave a comment
Government cloud adoption efforts lag as security concerns persist
When the Obama administration’s CIO declared that the government would move to a cloud-first policy for its technology procurements, it was sending a clear message that agencies would be expected to modernize their IT shops. But five years later, that … Continue reading
Posted in Cloud Computing
Tagged adoption, Cloud, concerns, efforts, Government, persist, Security
Leave a comment