If you judge
a fish by its’
climb a tree…
-Sir Albert Einstein
We understand that you can’t expect a fish to climb a tree. We realize that the people who have a knack of understanding cryptic source code in a software and websites, are very different from those who can tirelessly troubleshoot the problems in your network topology.
With this in mind, we are working towards developing our practice into distinct verticals – namely, Network, VoIP, Web and Application Development, Information and Cyber Security, Server Infrastructure and Technology Consulting. And of course, our first line of infantry – the ubiquitous and fanatical help-desk support.
Starting from this month, our newsletter will carry a “Simplify” section. This section is intended to simply some of the technical jargons that we use in the context of our business. We hope that this will help you better navigate your discussions internally as well as with external partners.
OF YOUR WEBSITE
Your website is…
The central piece of your marketing machinery – most of your public information and communication resides here.
The emissary of your on-line reputation – Search engines such as Google, Yahoo will crawl your website regularly, and assign reputation based on the content. They have also been known to block websites from appearing in search, should they detect that your website has been hacked or contain malicious software.
Remember it is very difficult to recover from a search engine’s “BlackList”.
Your brand ambassador – In the information age we live in, the inherent first response of potential clients, investors, partners and employees is to look up your website, whenever they are introduced to your name for the first time. And many times after.
Visible to the “malicious actors” – This is accessible from the public internet and hence more vulnerable to various kinds of cyber-attacks.
The doorway to your information infrastructure – More often than not, the webserver is hosted in the same environment as your other servers. If your web-server is compromised, it can allow malicious actors to access other servers in your network.
Website clean-up is more expensive than protection – Regular maintenance, audit and backup of your site comes at a fraction of the cost that you will incur to cleanup your website if it is hacked.
STEPS TO ENSURE THAT YOUR WEBSITE IS WELL PROTECTED
Simplifying The Tech Word: CLOUD
Whether you’re backing up photos or streaming our favorite TV shows, you may know it’s all made possible by the ubiquitous cloud. But for many, that’s where the understanding ends.
Before the advent of cloud technology, businesses maintained a fleet of computers (a.k.a. servers) to store information, host websites and web-applications. These computers usually resided within the office premises, albeit in a separate room or enclosure, often creating a comforting hum and generating significant amount of heat. Employees connected to the servers via office Local Area Network connectivity.
Availability of reliable high-speed network connectivity, allowed the industry to move servers from different business entities to a centralized location, reducing total costs of maintenance, cooling, security and availability among others. Improvement in virtualization techniques, allowed one single gigantic server to be chopped up into smaller “virtual” servers. These virtual servers then could be utilized for different purposes or even by different companies. Cloud took advantage of economies of scale to provide better infrastructure at a lesser total cost of ownership.
Another key advantage of cloud is that it easily allows an increase in the size of computing resources. With a traditional server, if you were to require a better, more powerful server with more disk space, you would need to junk your old server and buy a new one.
Public cloud providers allow companies to use the newest technology without having to buy and maintain it themselves. Google Cloud, Amazon Web Services, Microsoft Azure are typical examples of public cloud services that are available for business use.
Private cloud essentially means having the servers dedicated for yourself hosted in a data-center, connected to your office location by high-speed dedicated network connection.
In-Hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms.
“It is my ambition to say in ten sentences
what others say in a whole book.”
– Friedrich Nietzsche
“4 ways to ensure that your emails are read and not discarded with “TL;DR”
Considering most of the formal and business information exchange happens online over email, we were inspired to collate some of the best practices that makes your email more succinct, productive and effective.
Compulsory for the recipient to take some action
Requires the signature of the recipient
For informational purposes only, and there is no response or action required
Requires a decision by the recipient
Seeks permission or approval by the recipient
Coordination by or with the recipient is needed