Blog

March 31, 2016

10 Most Common Web Security Vulnerabilities

Guest Post

By Gergely Kalman, Security Specialist at Toptal For all too many companies, it’s not until after a breach has occurred that web security becomes a priority. During my years working as an IT Security professional, I have seen time and time again ...

Read More >

March 29, 2016

Using DNS to Debug Downtime

John Pollock

  At times, a web app or web site may appear to be down when the server it is on appears to be functioning properly. When this happens, it is important to know where the issue resides, as it may be easy to fix, or may require a lot of work or c...

Read More >

March 23, 2016

What is Data Logging

Brian Wheeler

Data logging is one of the most important aspects of most IT pros. So, do you know what it is?   Data logging is often talked about as a helpful tool that you can use when trying to maintain your various servers, databases, and other systems tha...

Read More >

March 17, 2016

Hosting For Freelance Developers: PaaS, VPS, Cloud, And More

Guest Post

By Nermin Hajdarbegovic, Technical Editor at Toptal At a glance, the hosting industry may not appear exciting, but it's grunts in data centres the world over that keep our industry going. They are, quite literally, the backbone of the Internet, a...

Read More >

March 15, 2016

How Did MongoDB Get Its Name?

Brian Wheeler

Curious how MongoDB got its name? Here's your quick history lesson for the day.  Example of a MongoDB query. Source: MongoDB. The company behind MongoDB MongoDB was originally developed by MongoDB, Inc., which at the time (2007) was named 1...

Read More >

March 02, 2016

Using a CLI for App Development and Deployment

Brian Wheeler

Find out how a CLI can help your company with app development and deployment  A CLI can help developers and administrators get apps deployed quickly, in addition to the other uses of CLIs, such as automating tasks for an operating system or run...

Read More >

February 24, 2016

Darknet Busters: Taking a Bite Out of Cybercrime-as-a-Service

Brian Wheeler

The first step in combatting the perpetrators of Internet crimes is to uncover the Darknet in which they operate. It's getting easier and easier for criminals to infiltrate your company’s network and help themselves to your financial and other ...

Read More >

February 17, 2016

How to Reduce App Deployment Time — Fast

Brian Wheeler

System changes occur so quickly that upgrades and updates have to be unobtrusive and ready to hit the ground running. The changing nature of application development necessitates new methods for ensuring updates and patches are deployed in near-...

Read More >

February 10, 2016

Cloud Multi-Tenancy Finds the Right Mix of Security and Scalability

Brian Wheeler

By offering enhanced security as well as efficient scalability, multi-tenancy has become the cloud’s most important attribute. Once perceived as the weak link in the cloud-security chain, multi-tenancy has evolved to become not only the foundat...

Read More >