Category: Systems

Search
DevOps and DevSecOps

DevOps and DevSecOps: Agile software development

DevOps and DevSecOps are work methodologies that aim to release better software, faster. They focus on the collaboration between software development and IT operations departments to increase agility in development and deployment processes. These methodologies are based on the Agile methodology to speed up processes across departments. These new approaches to software development are based

READ MORE
Inodes in Linux

Inodes in Linux: limit, usage and helpful commands

Inodes in Linux are unique identifiers that describe files and directories within a filesystem. It is important to keep an eye on them to avoid issues related to inode shortage or excessive usage. What is an inode? An inode is a data structure that keeps track of all the files and directories within a Linux

READ MORE
Legacy systems

What is a legacy system?

A legacy system is an old or out-dated system, technology or software application that continues to be used by an organization because it still performs the functions it was initially intended to do. Generally, legacy systems no longer have support and maintenance and they are limited in terms of growth. However, they cannot easily be

READ MORE
30th anniversary of the first Linux release

Linux: from a hobby to a collaborative tech revolution

September 17th, 2022 was Linux’s 31st anniversary. Linux was first released as a free operating system kernel on September 17th, 1991. What started as “just a hobby” for Linus Torvalds became the kernel of the GNU OS and one of the world’s most important operating systems. Linux’s history from 1991 to 2022 Linus Torvalds was

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm has reached its end of useful life, after 27 years since its publication. The National Institute of Standards and Technology (NIST) recommends replacing it for newer, more secure algorithms like SHA-2 and SHA-3. It aims for the SHA-1 hash function to be completely phased out by the end of 2030. SHA-1 cryptographic

READ MORE
Commonly used Linux commands

65 commonly used Linux commands

The following commonly used Linux commands allow users to perform numerous tasks using the Command Line Interface (CLI) instead of the Graphical User Interface (GUI), increasing control and speed. List of some of the most used Linux commands The following list includes helpful and interesting Linux commands to use distributions more effectively and enjoy greater

READ MORE
SSH keys set up guide

Step-by-step guide to setting up SSH keys on a Linux server

Would you like to learn to set up SSH keys on a Linux server or to use public key authentication? We have created this step-by-step guide about how to set up SSH keys on a Linux server to improve security when establishing a remote connection. There are diverse alternatives to establish a remote and secure

READ MORE
Linux 6.0

Linux kernel 6.0

Linux kernel 6.0 introduces diverse performance improvements, support for new hardware and security fixes, among other things. This new major version is the successor of the Linux 5.x.y series, whose last version is Linux 5.19. Linux 6.0: some new features and improvements On October 2, 2022, Linus Torvalds announced Linux 6.0 as an update with

READ MORE
Geographical redundancy or georedundancy

Georedundancy: building a stronger business continuity strategy

Georedundancy or geographical redundancy allows companies to increase availability, resilience and fault tolerance. Relying on geographically distributed data centers contributes to building a stronger business continuity strategy. It is also referred to as “geo-replication” or “geographical replication”. What is georedundancy? Georedundancy consists in replicating data and IT infrastructure in multiple remote data centers. Its goal

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.