Stackscale's Blog

Search
Cloud service models: SaaS, PaaS and IaaS

Main cloud service models: IaaS, PaaS and SaaS

The main three cloud service models are: IaaS, PaaS and SaaS. Each cloud service model covers different user and company needs, and provides a different level of control, security and scalability. IaaS is the cloud service model that offers a higher level of control compared with an on-premises solution. PaaS makes the process of developing

READ MORE
Cloud & digital transformation

Cloud computing at the core of the digital transformation

Cloud computing adoption is an essential step in digital transformation processes, as it enables the modernization of IT infrastructures to leverage further agility, scalability and productivity, among other advantages. The growth potential of the digital economy encourages more and more businesses to shift to new, disruptive technologies and methodologies, and the Cloud is always at

READ MORE
What is the IPv6 protocol

What is IPv6?

The Internet Protocol version 6 or IPv6 is a version of the Internet Protocol (IP). The Internet Protocol allows the transfer of data through a network to IP addresses (IPv4 or IPv6), which identify the different devices that are connected to the Internet, allowing communications among them. IPv6 should end up replacing IPv4. The transition

READ MORE
The evolution of the Internet from 1997 to 2021

The evolution of the Internet from 1997 to 2021

How has the Internet changed over the years? The Opte Project, by Barrett Lyon, captures the evolution of the Internet from 1997 to 2021. As the Internet is a network of networks, Barrett Lyon has leveraged the connections among all those networks to create a map of the Internet. This visual representation of the Internet

READ MORE
NoSQL databases

NoSQL databases: features, benefits and types

NoSQL databases are non-relational databases (DBs), intended for applications that need low latency and flexible models to manage large data volumes. They include a wide variety of database technologies designed to meet the development needs of modern applications — which are constantly generating huge amounts of new data. The migration from relational to non-relational databases

READ MORE
Edge computing

Edge computing & the exponential growth in data

Edge computing is a distributed computing architecture, key for those applications that need a really low latency, such as: self-driving cars, real-time image recognition or Augmented Reality (AR). This new paradigm originates in Content Distribution Networks (CDNs), created in the late 1990s to place content closer to end users as the Internet continued to grow

READ MORE
SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm has reached its end of useful life, after 27 years since its publication. The National Institute of Standards and Technology (NIST) recommends replacing it for newer, more secure algorithms like SHA-2 and SHA-3. It aims for the SHA-1 hash function to be completely phased out by the end of 2030. SHA-1 cryptographic

READ MORE
Commonly used Linux commands

65 commonly used Linux commands

The following commonly used Linux commands allow users to perform numerous tasks using the Command Line Interface (CLI) instead of the Graphical User Interface (GUI), increasing control and speed. List of some of the most used Linux commands The following list includes helpful and interesting Linux commands to use distributions more effectively and enjoy greater

READ MORE
Arista Networks

Arista Networks: networking for big data centers

Arista Networks develops networking solutions for big data centers and high-performance environments. Stackscale relies on Arista’s solutions, as they provide 10 to 100 Gigabits Ethernet switches that redefine network architectures and improve performance. What is Arista Networks? Arista Networks is a networking equipment company headquartered in Santa Clara, California, USA. It was founded in 2004

READ MORE
SSH keys set up guide

Step-by-step guide to setting up SSH keys on a Linux server

Would you like to learn to set up SSH keys on a Linux server or to use public key authentication? We have created this step-by-step guide about how to set up SSH keys on a Linux server to improve security when establishing a remote connection. There are diverse alternatives to establish a remote and secure

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Cookies customization
Stackscale, Grupo Aire logo

By allowing cookies, you voluntarily agree to the processing of your data. This also includes, for a limited period of time, your consent in accordance with the Article 49 (1) (a) GDPR in regard to the processing of data outside the EEA, for instead, in the USA. In these countries, despite the careful selection and obligation of service providers, the European high level of data protection cannot be guaranteed.

In case of the data being transferred to the USA, there is, for instance, the risk of USA authorities processing that data for control and supervision purposes without having effective legal resources available or without being able to enforce all the rights of the interested party. You can revoke your consent at any moment.

Necessary Cookies

Necessary cookies help make a web page usable by activating basic functions such as the page navigation and the access to secure areas in the web page. The web page will not be able to work properly without these cookies. We inform you about the possibility to set up your browser in order to block or alert about these cookies, however, it is possible that certain areas of the web page do not work. These cookies do not store any personal data.

- moove_gdpr_popup

 

Analytical cookies

Analytical cookies allow its Editor to track and analyze the websites’ users behavior. The information collected through this type of cookie is used for measuring the activity on websites, applications or platforms, as well as for building user navigation profiles for said websites, application or platform, in order to implement improvements based on the analysis of data on the usage of the service by users.

Google Analytics: It registers a single identification used to generate statistical data about how the visitor uses the website. The data generated by the cookie about the usage of this website is generally transferred to a Google server in the USA and stored there by Google LLC, 1600 Amphitheatre Parkway Mountain View, CA 94043, USA.

- _dc_gtm_UA-XXXXXXXX-X

- _gat_gtag_UA_XXXXXXXX_X

- _ga

- _gcl_au

- _gid