Stackscale's Blog

SSH Secure Shell protocol

SSH protocol: usage, versions and implementations

SSH, short for Secure Shell, is a remote administration and network protocol; originally designed to replace Telnet and other unsecured protocols such as the Berkeley Remote Shell (rsh). SSH enables secure remote system administration and file transfer over unsecured networks. In this article we will talk about the SSH protocol and its versions, SSH clients

READ MORE
Legacy systems

What is a legacy system?

A legacy system is an old or out-dated system, technology or software application that continues to be used by an organization because it still performs the functions it was initially intended to do. Generally, legacy systems no longer have support and maintenance and they are limited in terms of growth. However, they cannot easily be

READ MORE
CDN

What is a CDN or Content Delivery Network?

CDN is the acronym for Content Delivery Network or Content Distribution Network. The fast growth of the Internet worldwide led to the emergence of CDNs in the late 90s. They were born as a solution to mitigate the Internet’s performance bottlenecks. Since the Internet was quickly becoming mission-critical for a growing number of companies and

READ MORE
95th percentile, metering method for bandwidth usage

What is the 95th percentile bandwidth metering method?

The 95th percentile bandwidth metering method, also known as “burstable billing”, is the most effective method used for metering and billing bandwidth usage. That is probably why it has become a standard among most Internet Service Providers (ISPs) worldwide. This flexible method avoids penalizing customers for data transfer peaks and helps providers reduce their infrastructure

READ MORE
Security Operations Center

What is a Security Operations Center (SOC)?

In IT, a Security Operations Center (SOC) or Information Security Operations Center (ISOC) is a centralized location where an organization’s security team monitors, analyzes, detects and solves any security events that might arise. A SOC is usually established to protect sensitive data and comply with industry or government regulations. It involves a very proactive approach

READ MORE
Cloud service models: SaaS, PaaS and IaaS

Main cloud service models: IaaS, PaaS and SaaS

IaaS, PaaS and SaaS are the main three cloud computing service models. Each cloud service model covers different user and company needs, and provides a different level of control, security and scalability. There is no one-size-fits-all cloud service model for every business. The right choice will depend mainly on how many “layers” companies can or

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
Popular Linux distributions

19 popular Linux distributions

In the following list, we have gathered some of the most popular Linux distributions and some growing distros too. GNU/Linux operating systems are Unix-like and open source, and based on the Linux kernel. Among the long list of Linux distributions, there are a number of distros that clearly stand out among the others — in

READ MORE
DevOps and DevSecOps

DevOps and DevSecOps: Agile software development

DevOps and DevSecOps are work methodologies that aim to release better software, faster. They focus on the collaboration between software development and IT operations departments to increase agility in development and deployment processes. Based on the same philosophy, there is also “DataOps”. To speed up processes across departments, DevOps, DevSecOps and DataOps are based on

READ MORE
Most powerful supercomputers ranking

The 500 most powerful supercomputers use Linux

The world’s most powerful supercomputers use Linux. Everyone has heard something about supercomputers. A supercomputer is a device whose computing capabilities are by far higher than the capabilities of common computers. The most powerful supercomputer nowadays exceeds the 440 Petaflops (PFlops); a performance there’s no way a personal device can achieve. Since the end of

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Would you like to know more about Stackscale and our services?

Don’t hesitate to contact us for asking any question you have and discovering more about our Private Cloud, infrastructure and Bare Metal! We will be happy to know more about your project and see if we can grow together!