Category: Systems

Search
DevOps and DevSecOps

DevOps and DevSecOps: Agile software development

DevOps and DevSecOps are work methodologies that aim to release better software, faster. They focus on the collaboration between software development and IT operations departments to increase agility in development and deployment processes. These methodologies are based on the Agile methodology to speed up processes across departments. These new approaches to software development are based

READ MORE
Inodes in Linux

Inodes in Linux: limit, usage and helpful commands

Inodes in Linux are unique identifiers that describe files and directories within a filesystem. It is important to keep an eye on them to avoid issues related to inode shortage or excessive usage. What is an inode? An inode is a data structure that keeps track of all the files and directories within a Linux

READ MORE
Legacy systems

What is a legacy system?

A legacy system is an old or out-dated system, technology or software application that continues to be used by an organization because it still performs the functions it was initially intended to do. Generally, legacy systems no longer have support and maintenance and they are limited in terms of growth. However, they cannot easily be

READ MORE
30th anniversary of the first Linux release

Linux: from a hobby to a collaborative tech revolution

September 17th, 2022 was Linux’s 31st anniversary. Linux was first released as a free operating system kernel on September 17th, 1991. What started as “just a hobby” for Linus Torvalds became the kernel of the GNU OS and one of the world’s most important operating systems. Linux’s history from 1991 to 2022 Linus Torvalds was

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm has reached its end of useful life, after 27 years since its publication. The National Institute of Standards and Technology (NIST) recommends replacing it for newer, more secure algorithms like SHA-2 and SHA-3. It aims for the SHA-1 hash function to be completely phased out by the end of 2030. SHA-1 cryptographic

READ MORE
Commonly used Linux commands

65 commonly used Linux commands

The following commonly used Linux commands allow users to perform numerous tasks using the Command Line Interface (CLI) instead of the Graphical User Interface (GUI), increasing control and speed. List of some of the most used Linux commands The following list includes helpful and interesting Linux commands to use distributions more effectively and enjoy greater

READ MORE
SSH keys set up guide

Step-by-step guide to setting up SSH keys on a Linux server

Would you like to learn to set up SSH keys on a Linux server or to use public key authentication? We have created this step-by-step guide about how to set up SSH keys on a Linux server to improve security when establishing a remote connection. There are diverse alternatives to establish a remote and secure

READ MORE
Linux 6.0

Linux kernel 6.0

Linux kernel 6.0 introduces diverse performance improvements, support for new hardware and security fixes, among other things. This new major version is the successor of the Linux 5.x.y series, whose last version is Linux 5.19. Linux 6.0: some new features and improvements On October 2, 2022, Linus Torvalds announced Linux 6.0 as an update with

READ MORE
Geographical redundancy or georedundancy

Georedundancy: building a stronger business continuity strategy

Georedundancy or geographical redundancy allows companies to increase availability, resilience and fault tolerance. Relying on geographically distributed data centers contributes to building a stronger business continuity strategy. It is also referred to as “geo-replication” or “geographical replication”. What is georedundancy? Georedundancy consists in replicating data and IT infrastructure in multiple remote data centers. Its goal

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Cookies customization
Stackscale, Grupo Aire logo

By allowing cookies, you voluntarily agree to the processing of your data. This also includes, for a limited period of time, your consent in accordance with the Article 49 (1) (a) GDPR in regard to the processing of data outside the EEA, for instead, in the USA. In these countries, despite the careful selection and obligation of service providers, the European high level of data protection cannot be guaranteed.

In case of the data being transferred to the USA, there is, for instance, the risk of USA authorities processing that data for control and supervision purposes without having effective legal resources available or without being able to enforce all the rights of the interested party. You can revoke your consent at any moment.

Necessary Cookies

Necessary cookies help make a web page usable by activating basic functions such as the page navigation and the access to secure areas in the web page. The web page will not be able to work properly without these cookies. We inform you about the possibility to set up your browser in order to block or alert about these cookies, however, it is possible that certain areas of the web page do not work. These cookies do not store any personal data.

- moove_gdpr_popup

 

Analytical cookies

Analytical cookies allow its Editor to track and analyze the websites’ users behavior. The information collected through this type of cookie is used for measuring the activity on websites, applications or platforms, as well as for building user navigation profiles for said websites, application or platform, in order to implement improvements based on the analysis of data on the usage of the service by users.

Google Analytics: It registers a single identification used to generate statistical data about how the visitor uses the website. The data generated by the cookie about the usage of this website is generally transferred to a Google server in the USA and stored there by Google LLC, 1600 Amphitheatre Parkway Mountain View, CA 94043, USA.

- _dc_gtm_UA-XXXXXXXX-X

- _gat_gtag_UA_XXXXXXXX_X

- _ga

- _gcl_au

- _gid