29
Sep

The Shellshock Vulnerability and What It Means For You

Tags: 

3
Sep

Useful Network Tools for Admins

Ping

Ping is one of the most used network tools to perform a basic connectivity test between a user and a destination host. This test is made possible by using the Internet Control Message Protocol (ICMP), which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host. There are 3 responses returned from a ping command:

1. Success - shown by a reply from desired target (see below)

 

28
May

Secure Windows XP use after support Ends – Best Practices

If you have to continue running Windows XP in your IT environment even though Microsoft has ended its support, you are not alone. It is estimated that between 20%-25% of enterprise still run Windows XP and at least 10% of their systems.

One of the main reasons why rapid migration is not an option is because applications that include browsers cannot be migrated to a later OS, and this acts as an inhibitor to upgrading. Embedded XP systems such as POS devices can also be impacted as they cannot be rapidly migrated either.

Tags: 

11
Apr

The Heartbleed vulnerability and what it means for you

Tags: 

6
Feb

A Shift In Balance: Virtualization Growth Drives Demand For Greater App Performance

23
Jan

What Can a Particular ADC Vendor Offer Me? - Part 4 - Load Balancer Buyers Guide

At KEMP Technologies we strive to provide you with all of the information that you need to make an informed buying decision and access to the best data about our products and how they can fit your unique needs.

An easy to navigate website

KEMP Technologies provides an easily navigable website full of useful resources that can help you to define the correct solution for your deployment:

·      Expert webinar series on a number of popular Enterprise applications

13
Jan

How Do Other Businesses Buy Load Balancing Application Delivery Controllers (ADCs)? - Part 3 - Load Balancer Buyers Guide

The decision of which ADC vendor to leverage for a Load Balancing solution is a common one faced by many organizations. Clearly defining the application infrastructure and business requirements is a great help in limiting your research criteria.

The check list

Having a check list is a great way to simplify the selection process. Many Enterprises compose lists including the following line items:

21
Dec

How to choose the right hypervisor: Nine factors to evaluate

The selection of the right hypervisor starts with an important decision; do you believe that a bare-metal hypervisor or a hosted hypervisor is the right choice for you? This is the first important decision that you need to confront and you need to be prepared to deal with a number of other important issues that you will need investigate and decide upon in order to make sure that you make the right choice of the hypervisor that will exactly respond to your needs.

Make a check list of the important research that you will need to do, satisfy yourself that you have:

16
Dec

Four Questions to Help You Decide on a Load Balancing Solution - Part 2 - Load Balancer Buyers Guide

Deciding to implement a Load Balancing solution before unexpected events could well be the best course to take in order to reduce infrastructure-related costs while optimizing the resilience of the entire environment.

28
Nov

Is your Environment Performing as Expected? - Part 1 - Load Balancer Buyers Guide

Tags: 

Pages