Stackscale's Blog

Search
Zero Trust security model

What is the Zero Trust security model?

Zero Trust is an approach to the design and implementation of IT systems based on the principle of “never trusting, always verifying” every device. In this security model, inherent trust in the network is removed; no matter whether a device is within a corporate LAN or whether it has already been verified before. Every request-response

READ MORE
Containerization and containers orchestration

Containers, containerization systems and orchestrators

The terms “container” and “containerization” are borrowed from the shipping industry. While in the shipping industry containers are used to physically separate different cargoes, in IT, virtual containers package the code, config files, libraries and dependencies an application needs to run. A container is another form of virtualization, as virtual machines are, and Docker and

READ MORE
Key elements for choosing a cloud provider

7 aspects to consider when choosing a cloud provider

Choosing a cloud provider is not an easy task, since there are many options available and analyzing all of them would be unfeasible. However, picking the right provider for your business is critical to long-term success. Therefore, to effectively meet your expectations and ensure a successful migration to the cloud, you need a clear strategy.

READ MORE
Tarugoconf 2021 from October 21st to October 23rd

Stackscale participates in the Tarugoconf 2021

Stackscale participates one more year in the Tarugoconf, a technological and entrepreneurial event. As last year’s edition, the Tarugoconf 2021 will be an online event with a lot of interesting content, networking and inspiring experiences. Although we cannot wait for this great event to come back to normal, last year’s online experience was fantastic and

READ MORE
China's plan to accelerate IPv6 adoption

China’s plan to accelerate IPv6 adoption over the next 5-10 years

Last July 23rd, 2021, the Cyberspace Administration of China and the office of the Central Cyberspace Affairs Commission announced its plan to accelerate the adoption and application of the IPv6 protocol over the next 5-10 years. The plan is divided in three stages and is to be completed over the next decade. With these timeline

READ MORE
Stackscale at the IDC CIO Summit 2021

Stackscale at IDC CIO Summit 2021 in Spain

Stackscale is one of the sponsors of next week’s IDC CIO Summit 2021 in Spain. A digital event that will focus on the key aspects of digital business acceleration in a context of deep and constant change. The event will take place on September 22nd and 23rd, 2021 on the virtual platform Hopin. IDC CIO

READ MORE
Archie legacy server at the University of Warsaw in Poland

Archie, the first Internet search engine

September 10, 2021 is the 31st anniversary of Archie, the first Internet search engine. Archie was launched on September 10, 1990, and developed by Alan Emtage, Bill Heelan and Peter Deutsch at McGill University in Montreal (Canada). This first search engine had nothing to do with the interactive interfaces we know. On the contrary, its

READ MORE
SSH Secure Shell protocol

SSH protocol: usage, versions and implementations

SSH, short for Secure Shell, is a remote administration and network protocol; originally designed to replace Telnet and other unsecured protocols such as the Berkeley Remote Shell (rsh). SSH enables secure remote system administration and file transfer over unsecured networks. In this article we will talk about the SSH protocol and its versions, SSH clients

READ MORE
CDN

What is a CDN or Content Delivery Network?

CDN is the acronym for Content Delivery Network or Content Distribution Network. The fast growth of the Internet worldwide led to the emergence of CDNs in the late 90s. They were born as a solution to mitigate the Internet’s performance bottlenecks. Since the Internet was quickly becoming mission-critical for a growing number of companies and

READ MORE
95th percentile, metering method for bandwidth usage

What is the 95th percentile bandwidth metering method?

The 95th percentile bandwidth metering method, also known as “burstable billing”, is the most effective method used for metering and billing bandwidth usage. That is probably why it has become a standard among most Internet Service Providers (ISPs) worldwide. This flexible method avoids penalizing customers for data transfer peaks and helps providers reduce their infrastructure

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Cookies customization
Stackscale, Grupo Aire logo

By allowing cookies, you voluntarily agree to the processing of your data. This also includes, for a limited period of time, your consent in accordance with the Article 49 (1) (a) GDPR in regard to the processing of data outside the EEA, for instead, in the USA. In these countries, despite the careful selection and obligation of service providers, the European high level of data protection cannot be guaranteed.

In case of the data being transferred to the USA, there is, for instance, the risk of USA authorities processing that data for control and supervision purposes without having effective legal resources available or without being able to enforce all the rights of the interested party. You can revoke your consent at any moment.

Necessary Cookies

Necessary cookies help make a web page usable by activating basic functions such as the page navigation and the access to secure areas in the web page. The web page will not be able to work properly without these cookies. We inform you about the possibility to set up your browser in order to block or alert about these cookies, however, it is possible that certain areas of the web page do not work. These cookies do not store any personal data.

- moove_gdpr_popup

 

Analytical cookies

Analytical cookies allow its Editor to track and analyze the websites’ users behavior. The information collected through this type of cookie is used for measuring the activity on websites, applications or platforms, as well as for building user navigation profiles for said websites, application or platform, in order to implement improvements based on the analysis of data on the usage of the service by users.

Google Analytics: It registers a single identification used to generate statistical data about how the visitor uses the website. The data generated by the cookie about the usage of this website is generally transferred to a Google server in the USA and stored there by Google LLC, 1600 Amphitheatre Parkway Mountain View, CA 94043, USA.

- _dc_gtm_UA-XXXXXXXX-X

- _gat_gtag_UA_XXXXXXXX_X

- _ga

- _gcl_au

- _gid