Stackscale's Blog

30th anniversary of the first Linux release

Linux: from a hobby to a collaborative tech revolution

September 17th, 2021 is the 30th anniversary of Linux. Linux was first released as a free operating system kernel on September 17th, 1991. What started as “just a hobby” for Linus Torvalds became the kernel of the GNU OS and one of the world’s most important operating systems. Linux’s history from 1991 to 2021 Linus

READ MORE
Stackscale at the IDC CIO Summit 2021

Stackscale at IDC CIO Summit 2021 in Spain

Stackscale is one of the sponsors of next week’s IDC CIO Summit 2021 in Spain. A digital event that will focus on the key aspects of digital business acceleration in a context of deep and constant change. The event will take place on September 22nd and 23rd, 2021 on the virtual platform Hopin. IDC CIO

READ MORE
Ranking programming languages 2021

Most popular programming languages in 2021

Which are the most popular programming languages in 2021? The list of most commonly used programming languages in 2021 vary depending on the source. Let’s compare September 2021’s PYPL index ranking with that of Stack Overflow’s 2021 Developer Survey. Top 10 programming languages (PYPL) According to the PYPL index, these are the most popular programming

READ MORE
Archie legacy server at the University of Warsaw in Poland

Archie, the first Internet search engine

September 10, 2021 is the 31st anniversary of Archie, the first Internet search engine. Archie was launched on September 10, 1990, and developed by Alan Emtage, Bill Heelan and Peter Deutsch at McGill University in Montreal (Canada). This first search engine had nothing to do with the interactive interfaces we know. On the contrary, its

READ MORE
Planning a Disaster Recovery solution

How to get a Disaster Recovery Plan (DRP) ready

Business continuity depends significantly on IT. So, if you want to be prepared against any contingency, you need to get your Disaster Recovery Plan (DRP) ready sooner rather than later. A DRP will allow you to recover your mission-critical data and applications in the shortest time possible. Therefore, it is important to properly adapt it

READ MORE
SSH Secure Shell protocol

SSH protocol: usage, versions and implementations

SSH, short for Secure Shell, is a remote administration and network protocol; originally designed to replace Telnet and other unsecured protocols such as the Berkeley Remote Shell (rsh). SSH enables secure remote system administration and file transfer over unsecured networks. In this article we will talk about the SSH protocol and its versions, SSH clients

READ MORE
Legacy systems

What is a legacy system?

A legacy system is an old or out-dated system, technology or software application that continues to be used by an organization because it still performs the functions it was initially intended to do. Generally, legacy systems no longer have support and maintenance and they are limited in terms of growth. However, they cannot easily be

READ MORE
CDN

What is a CDN or Content Delivery Network?

CDN is the acronym for Content Delivery Network or Content Distribution Network. The fast growth of the Internet worldwide led to the emergence of CDNs in the late 90s. They were born as a solution to mitigate the Internet’s performance bottlenecks. Since the Internet was quickly becoming mission-critical for a growing number of companies and

READ MORE
95th percentile, metering method for bandwidth usage

What is the 95th percentile bandwidth metering method?

The 95th percentile bandwidth metering method, also known as “burstable billing”, is the most effective method used for metering and billing bandwidth usage. That is probably why it has become a standard among most Internet Service Providers (ISPs) worldwide. This flexible method avoids penalizing customers for data transfer peaks and helps providers reduce their infrastructure

READ MORE
Security Operations Center

What is a Security Operations Center (SOC)?

In IT, a Security Operations Center (SOC) or Information Security Operations Center (ISOC) is a centralized location where an organization’s security team monitors, analyzes, detects and solves any security events that might arise. A SOC is usually established to protect sensitive data and comply with industry or government regulations. It involves a very proactive approach

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Would you like to know more about Stackscale and our services?

Don’t hesitate to contact us for asking any question you have and discovering more about our Private Cloud, infrastructure and Bare Metal! We will be happy to know more about your project and see if we can grow together!