+27 10 013 0477 [email protected]

WELCOME TO OUR BLOG

VPN in the Cloud Age

What is a VPN (virtual private network)? In enterprise computing, a VPN is a secure tunnel that extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly...

read more

Cloud Backup and Replication

A good business continuity strategy is underpinned by a robust disaster recovery plan no matter how small or big an organisation is. Fortunately, the cloud has simplified this once complicated area of computing. Cloud Backups On-premises to Cloud Backups File Level...

read more

Linux and Windows Integration

Modern IT infrastructure has evolved into a heterogeneous mixture of Windows and Unix/Unix-like Operating systems, with the focus of this post being Linux. Decentralised VS Centralised Authentication Decentralised Authentication Decentralised authentication is when...

read more

Server High Availability

If you are running a mission-critical system, chances are that you wouldn’t like to experience downtime on such a system. Some systems are so critical that five minutes of downtime can cost an organisation a lot of money. In this post we will touch on the basics of...

read more

Cloud Computing 101

There has been a lot of noise about Cloud Computing in the last decade or so. In this post we are going back to the basics of Cloud Computing. We’ll explain what it is, its different models, and what its advantages and disadvantages are. What exactly is Cloud...

read more