Serverless services were introduced in a form that many of us didn’t even know we wanted or needed. If AWS had asked the people what they wanted, they would have said something like ‘better abstraction for servers.’ Similarly to what Henry Ford famously said: “If I... Read more
As we move into unprecedented times, where operational budgets are under scrutiny, it’s important to look at your variable IT costs and how you may reduce them. One of the many benefits of cloud is its variable and flexible nature, and hence it’s a great candidate for... Read more
Attackers are constantly developing new kinds of ransomware that use various attack vectors like malvertizing, ransomworm, and peer-to-peer file transfer programs. And now there is even Ransomware-as-a-Service, where hackers sell their malware to other cybercriminals,... Read more
Introduction Modern software companies use DevOps practices to build their applications. With the rise of DevOps has come the new methods of Continuous Integration, Continuous Delivery, (CI/CD). Continuous Integration (CI) is a fundamental process for the development... Read more
Network Availability technology is used to allow one or more failures in a network without losing connectivity, or at least for a short time. Plenty of different technologies can be used for this purpose. We have tools in Software Design Network (SDN), or Software... Read more
Years ago, in a galaxy not so far away, Systems Administrators had one thing on their minds: keeping their infrastructure up and running. As we fast forward through time, it’s become clear that there is no one thing that keeps IT folks up at night. Today’s... Read more
Just a few weeks ago I was with my daughter walking down the high street when she pointed at a derelict shop. She read the shop name and asked me what was there before. The shop she was looking at was in fact a closed down DVD rental shop. I explained that myself and... Read more
There is a saying we use in IT “not all data is equal” that we use to in relation to datasets for both primary storage location and backup policies. This can be reused when we are talking about deduplication – “not all deduplication is equal” The goal of this blog is... Read more
With VMworld 2019 there were some very exciting updates and announcements that have once again put VMware firmly at the center of innovation. Asystec were there in force with our customers soaking up the keynotes, breakout presentations and the 1:1 specialist customer... Read more
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.