Web directory, archive
Search web-archive-uk.com:

Find domain in archive system:
web-archive-uk.com » UK » S » SERVERSPACE.CO.UK

Total: 117

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • ServerSpace Hybrid Cloud Hosting and Virtualisation Blog | isv
    Public Cloud Plus the Advantages and Disadvantages for ISVs 29 Oct 14 Posted October 29 2014 by Tim Pat Dufficy If you re in the Software as a Service SaaS business and not already operating in a fully virtualised outsourced world you ve no doubt been considering it Of the many choices available to you Public Cloud is perhaps one of the least well understood Read More Cloud Hosting SaaS

    Original URL path: https://www.serverspace.co.uk/blog/topic/isv (2016-04-24)
    Open archived version from archive

  • Containerisation vs Virtualisation – what’s the difference?
    how does it differ from virtualisation What is containerisation A container is a uniform structure in which any application can be stored transported and run It is named for and often compared to the standardised intermodal containers used in the shipping industry for efficient transportation In the software world containerisation is an efficient method for deploying applications A container encapsulates an application with its own operating environment It can be placed on any host machine without special configuration removing the issue of dependencies The techniques of containerisation are not new but have shot to prominence as businesses such as Netflix and Google have used them to overcome the constraints of machine virtualisation What s the difference between containerisation and virtualisation Both of these approaches allow you to make workloads hardware agnostic In fact at its simplest containerisation is just another approach to server virtualisation However there are substantial differences between the two methods Deploying VMs the approach we ve all become accustomed to over the last five years is hardware virtualisation whereas containerisation is OS virtualisation An application on a VM requires a guest OS and thus an underlying hypervisor to run By contrast an application in a container doesn t require a guest OS or hypervisor It allows an application to run in the Userspace of the OS a segment of the computer memory that is kept separate from the critical processes of the OS kernel This leads to improved performance as an application s instructions do not have to pass through the guest OS and the hypervisor to reach the CPU It also means that applications in containers are smaller and can be started up in seconds compared to minutes for VMs Significantly container applications offer much more stability they never hang on the host OS like VM

    Original URL path: https://www.serverspace.co.uk/blog/containerisation-vs-virtualisation-whats-the-difference (2016-04-24)
    Open archived version from archive

  • 8 pros and 5 cons of containers for app deployments
    seconds compared to minutes for VMs Faster start up means faster development testing and deployment 4 Greater flexibility Again due to containers being much more lightweight they can be copied moved and backed up a lot quicker and easier than a VM 5 Improved hardware efficiency Many more containers can be installed on any one host compared to VMs This provides better capacity utilisation and consolidation on less machines 6 Run anywhere Container apps can be installed on any server running the right OS without having to customise the config or recreate the development environment This is because they are shipped with everything they need to run so they can easily run on a wide variety of platforms 7 Promotes cloud native development Harnessing the elastic cloud is easier when you virtualise at the OS level like containerisation does instead of the server level like VMs Containerisation is a microservices approach that enables function specific containers which can be easily replicated and deployed 8 Better supports DevOps Containerisation offers greater flexibility to DevOps with the ability to run containers on a wide range of platforms It also streamlines operations by removing manual installation configuration and OS maintenance The cons of containerisation 1 Linux orientated Containerisation is generally limited to Linux OSs and applications as it has evolved from the Linux Containers LXC environment However Microsoft is working on a container environment for Windows applications named Drawbridge which is yet for a release date 2 Security complications Containers introduce some new security challenges Firstly the way in which Linux container apps relate to their host machine and it s OS kernel potentially creates vulnerabilities Critical kernel subsystems such as SELinux and Cgroups are not secured by default but it is possible to secure these Secondly the emergence of a growing ecosystem

    Original URL path: https://www.serverspace.co.uk/blog/8-pros-and-5-cons-of-containers-for-app-deployments (2016-04-24)
    Open archived version from archive

  • Introduction to containerisation – the new virtualisation
    Nov 15 Posted November 19 2015 by Jason Showell There s a new method of virtualisation that is taking the SaaS industry by storm at the moment containerisation I say new but the methods of containerisation have been around for years It s only now though that the benefits of using containers to deploy applications is being realised This is partly thanks to Docker the open source project launched in 2013 that uses the Linux kernel to enable independent containers to run within a single Linux instance Also its use by notable companies such as Google and Netflix has put containerisation at the forefront of the industry More and more businesses are turning to containerisation as an efficient flexible means of virtualisation But there remains confusion about what containerisation actually is how it differs from server virtualisation and whether it s a viable option for different application deployments That s why we ve created the Introduction to Containerisation eBook In this eBook we cover the ins and outs of containerisation in plain English with the aim to help you gain a clear understanding of containerisation so you can make a strategic decision for or against investigating it further for your

    Original URL path: https://www.serverspace.co.uk/blog/introduction-to-containerisation-the-new-virtualisation (2016-04-24)
    Open archived version from archive

  • ServerSpace Hybrid Cloud Hosting and Virtualisation Blog | Jason Showell
    it be used to safeguard your network We ve decided to follow up our most popular blog post on using SNMP to control remote APC switched rack PDUs with a complete introduction to SNMP Read More SNMP Containerisation vs Virtualisation what s the difference 26 Nov 15 Posted November 26 2015 by Jason Showell Containers and virtual machines are two of the most popular methods for application deployment Understanding the similarities and differences can help you to choose the right method for your project Read More 8 pros and 5 cons of containers for app deployments 23 Nov 15 Posted November 23 2015 by Jason Showell Containerisation offers performance and efficiency gains depending on the application you deploy and the expertise of your development team The SaaS industry has a new buzzword containerisation Few innovations have been adopted quite as quickly as containerisation is being embraced right now by SaaS companies Read More Introduction to containerisation the new virtualisation 19 Nov 15 Posted November 19 2015 by Jason Showell There s a new method of virtualisation that is taking the SaaS industry by storm at the moment containerisation I say new but the methods of containerisation have been around for years Read More Protect your business and home from weak password vulnerability 22 Dec 14 Posted December 22 2014 by Jason Showell Recent software vulnerabilities like Heartbleed Shellshock and Bash get an awful lot of press and when exploited can cause devastating damage to businesses In reality however there is a far greater threat to the security of your corporate data lurking much closer to home Sleeping with the enemy Studies have repeatedly shown that weak passwords are in fact the biggest threat to corporate data security The 2014 Trustwave Global Security Report found that weak passwords were responsible for

    Original URL path: https://www.serverspace.co.uk/blog/author/jason-showell/page/1 (2016-04-24)
    Open archived version from archive

  • Ransomware a growing threat to businesses – McAfee report
    that makes ransomware attacks available to anyone with user friendly consoles to instigate attacks The report said Off the shelf toolkits for malware affiliate programs for ransomware fill in the blank attack creation programs and other familiar business offerings have been showing up in the dark web to support faster simpler and broader distribution of attacks It now takes very little skill to be a cyber criminal Even with security protections in place the lucrative rewards of ransomware means criminals are constantly adapting attacks to bypass protection systems Responsible user practises is of course the cybersecurity measure that can be the most difficult to implement company wide but it s an essential line of prevention This boils down to education about avoiding suspicious emails attachments and links and also keeping applications and operating systems updated and patched In McAfee s report it s noted that over the past five years a big surprise is the continued lack of attention by businesses and consumers alike to updates patches password security security alerts default configurations and other easy but critical ways to secure cyber and physical assets One formidable precaution against ransomware is a disaster recovery plan that utilises cloud backup If such an attack occurs by taking the effected device off your network immediately deleting the encrypted files and downloading clean versions of the files from backup you will avoid business disruptive data loss For more information about this growing threat see our previous post about how to protect your business from ransomware McAfee also reported that the uptake of virtualisation and cloud hosting technology has changed the fundamental aim of many attacks on devices attackers gain access to devices as a path to where the important data resides not primarily for the small amount of data on the infiltrated device

    Original URL path: https://www.serverspace.co.uk/blog/ransomware-mcafee-report (2016-04-24)
    Open archived version from archive

  • Disaster Recovery: Why Veeam replaces legacy tools
    site without disrupting production and then easily failback to normal business operations once issues are resolved It works by taking snapshots of your entire VM disk and then copying these images to another location This removes the need for application and file system indexing and the agents that perform it Veeam includes several technologies that enable superfast and efficient virtual backup such as source side deduplication and compression which prevents redundant data from being copied change block tracking which improves efficiency in performing incremental backups by keeping track of the storage blocks of virtual machines as they change over time parallel processing which allows simultaneous processing of multiple VMs and VM disks built in WAN acceleration which reduces the volume of data that is sent across the WAN by caching duplicate files Should your VM fail a replica from the latest backup in a ready to start state is instantly available to minimise disruption with near continuous data protection This enables the best RPOs and RTOs i e the maximum period that data might be lost and the target time for resumption of service after an incident Veeam provides an intelligent failover mechanism which allows the automation of processes of network mapping and IP configuration to a DR site which would usually need to be executed manually Once you re ready to restore operations you can failback to the original VM to a machine in a new location or you can make the replica VM your new production machine How do legacy solutions compare Legacy solutions cannot offer the speed and flexibility that Veeam provides for VM backup and replication Legacy tools require time and cost consuming agents inside VMs to perform functions separate tools and licenses to enable advanced replication special indexing of each backup and they can take

    Original URL path: https://www.serverspace.co.uk/blog/disaster-recovery-why-veeam-replaces-legacy-tools (2016-04-24)
    Open archived version from archive

  • 5 Top Tips for Knowledge Transfer within Software Companies
    may even be the new person s line manager or head of department It s so easy to put documentation to one side when you re busy but it s essential to free you up from the responsibility of being the font of knowledge for a vital system or process Luckily these days there are better tools available for creating documentation than endless Word documents Depending on the task or the people you re handing over to commenting out your work on Github or creating a wiki could be a much better solution for than endless pages of screenshots and bullet points that are difficult to sift through If that s still too much work to consider why not look into 2 Screen Recording Software If it takes too long to explain it why not just make a recording while you re completing staff training There are plenty of lists of free screen recording software available online You may need to buy a microphone for your computer but if a small 10 15 spend can save you hours of frustrating note making then the overall cost saving is clear Your trainees will have the recording available whenever they need to go over a step in the process but they ll benefit from the memory of having to put it into practice themselves 3 Break it Down With the best will in the world no trainee is going to get every step of a new process right on their first attempt An effective training process breaks down into roughly 4 stages Theory Either by reading or listening the trainee is given a sense of the theory behind a process or system Shadowing A trainee watches a trainer go through a process Reverse Shadowing The trainee completes the process under supervision guidance from the trainer Questioning and Mastery As the trainee puts their new knowledge into practice they begin to ask more in depth questions about the process that indicate they are beginning to gain mastery see scope for improvement 4 Practice Makes Perfect There s no such thing as a standard training process Some of the above stages might need repeating such as if a trainer finds during reverse shadowing that the trainee is making basic mistakes Alternatively the order of the stages might change depending on an individual s learning style If for example the trainee is struggling with a theory they may find it easier to apply the relevant concepts once they ve got a more practical understanding of the task if they re a pragmatic learner It can be difficult to remain patient if you ve been using a process for so long that you could do it in your sleep but try to be objective If someone only completes a task once a month it may take longer for them to master the basics Ultimately you will need to know when to draw the line If you re constantly supervising and correcting a colleague s mistakes however

    Original URL path: https://www.serverspace.co.uk/blog/5-top-tips-for-knowledge-transfer-within-software-companies (2016-04-24)
    Open archived version from archive

web-archive-uk.com, 2016-10-26