Stackscale's Blog

Search
Pretty Good Privacy, PGP

PGP, cryptographic privacy and authentication

PGP provides cryptographic privacy and authentication when communicating or transferring data over the Internet. How does it do so? By using public-key cryptography, symmetric-key cryptography and digital signatures. We share a lot of data in our daily lives, both professionally and personally, and privacy is a top priority. On this matter, PGP is one the

READ MORE
Data immutability

Data immutability: resilience against cyber threats

Data immutability keeps growing in popularity as an ally to ensure data security, regulatory compliance and data recovery. As cyber threats keep on the rise, data security and disaster recovery planning has become indispensable for business continuity; and immutable data gain relevance on this matter. What is data immutability? As defined in the Cambridge Dictionary,

READ MORE
Pioneers of computer science

25 Pioneers of computer science

Many pioneers of computer science did not probably imagine how far computer programming would arrive. However, it is to a large extent thanks to their contributions that computer programming and automation has gone a long way over the past centuries. Here is a list of some of the pioneers of computer science from the 18th

READ MORE
What is supercomputing

What is supercomputing?

Supercomputing is a type of high-performance computing that uses computers with high computational capabilities (supercomputers) to process complex calculations and large volumes of data. Supercomputers are made up of more than one CPU, interconnects, I/O systems, memory and processor cores. Performance and parallel processing Supercomputing performance is measured in floating-point operations per second: FLOPS. The

READ MORE
What is a man in the middle attack or MiTM attack

What is a man in the middle attack?

A man in the middle attack is a security attack during which an attacker enters a communication between two parties undetected, redirecting data to pass through a node he controls. It is a type of session hijacking. Let’s deep into what a man in the middle attack is as well as into how to prevent

READ MORE
Beneficios de la nube privada en 3 sectores diferentes

Benefits of private cloud in 3 different sectors

Let’s assess the benefits of private cloud in 3 different sectors. Many companies can benefit from private cloud features and advantages, regardless of their size and industry. In this post, we have collected 3 customer success stories that have chosen the private cloud as their infrastructure solution. Private cloud for B2B software Gesio® is an

READ MORE
The difference between backup and data retention

The difference between backup and data retention

Both backup and data retention are types of data preservation, but they do so for different purposes. While backup retention focuses on storing data for recovery in case of data corruption, system failures or other contingencies, data retention focuses on preserving data during a specific period of time in order to meet particular business or

READ MORE
DE CIX Internet Exchange

DE-CIX: one of the largest Internet Exchanges worldwide

DE-CIX (Deutscher Commercial Internet Exchange) is one of the Internet Exchange Points that carries more traffic worldwide. Currently, it operates neutral interconnection platforms in Europe, the Middle East, North America and Asia. Infrastructure and interconnection The mission of DE-CIX is to make interconnection easy anywhere. It was established in the 1990s in Frankfurt, Germany, and

READ MORE
Black Friday Technical Strategy: plan in advance, adapt your infrastructure, test all services, minimize risks and be available.

5 steps to technically succeed in your Black Friday Strategy

Preparing your eCommerce Black Friday strategy? Keep in mind these 5 simple steps to ensure your eCommerce site can make the most of this campaign. With consumers getting more and more sophisticated and demanding, every second counts. Thus, high-availability, performance and security are more important than ever. A great sales and marketing plan can bring

READ MORE
What are load tests?

Hardware and software load testing

In computing, load testing is a type of performance test used to simulate concurrent user visits and interactions in an environment or site to verify whether it can handle both expected and high load conditions. Load tests help determine maximum operating capacity as well as bottlenecks or issues that might be causing a degradation of

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.