Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
Posted on 08.24.20 by Jeff Edwards
DevOps! Over the past half-decade, the illustrious marriage between Development and Operations has simultaneously become the biggest buzzword in tech since ~The Cloud~, and a critical piece of software engineering and delivery methodology. But to many, the DevOps...
Posted on 03.20.20 by Jeff Edwards
If you work in IT, or if you're in any position to evaluate and choose IT tools, chances are you're familiar with the names Gartner and Forrester.
Posted on 12.10.19 by Jeff Edwards
It happened again, the Avast CCleaner application has been targeted by another attempted supply chain attack. This most recent supply chain attack should serve as an important security reminder for everyone.
Posted on 11.19.19 by Jeff Edwards
With the holiday’s right around the corner, it is time to give thanks for the people that are really important in your life—like your SysAdmin.
Posted on 11.04.19 by Jeff Edwards
There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.
Posted on 10.25.19 by Jeff Edwards
Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions.
Posted on 10.16.19 by Jeff Edwards
If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...
Posted on 09.13.19 by Jeff Edwards
The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT...
Posted on 08.29.19 by Jeff Edwards
By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...
Posted on 08.16.19 by Jeff Edwards
If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...
Click here for more information about the rights of California Residents under the California Consumer Privacy Act.