Technical

How to protect yourself from Petya, the new Ransomware outbreak.

Introduction A new wave of ransomware attacks targeting organizations across the world has been reported June 27, 2017. Reports indicate around 2,000 attacked users so far. The ransomware Petya was first reported in Ukraine, where its government, banks, state power utility and Kiev’s airport and metro system all particularly badly affected. The food giant Mondelez,

Read More

The Connected Car

Today, smartphones and tablets have become an essential part of any computing experience. They take a special importance in the world of business as they continually to provide tools and gadgets that change the way we do business on a daily business. The world of mobile devices continues to experience exponential growth and developments. The

Read More

Mozilla Firefox OS: A Revolution in the World of Smart Phones

Today smart phones take up a large share of the technology and electronic gadgets markets. The increased reliance on smart phones has made them an essential part of our everyday life. The guys at Mozilla wanted a share of this market. What they did in this respect was pretty ingenious. Instead of targeting the same crowded

Read More

What is M2M?

If Sci-Fi movies have taught us anything, it is that in the future machines will be able to communicate and make decisions by themselves. The future is actually already here thanks to technology known as M2M or machine-to-machine communication. M2M is all about enabling the flow of data between machines regardless of the type of

Read More

Get the most out of your WiFi

Today’s homes and offices don’t feel right without having a good WiFi connection access. After all, home is where WiFi connects automatically. In the following we look at simple tips and tricks to get the most out of your WiFi access point.  Security: A key point to pay attention to is to make sure that

Read More

5 ways to speed up as slow PC

Remove unnecessary files If you have had your PC for a while, chances are you have loads of accumulated software that you don’t really use anymore. Most of these you won’t actually ever use again. Sometimes, some of these programs can even be running in the background without you knowing. This slows down you PC. To get rid of these

Read More

Add a Network Printer

Feeling lost ? everybody body is using the office printer and you can’t find it ? don’t worry help is here. – Click on start >> Devices and Printers – Select the add a printer option from the top menu – Select add network, wireless, or Bluetooth printer – Search for the network printer you want

Read More

Internet Cookies

Have you ever wondered why you only need to login to Facebook once each session? If a password is required to access your Facebook data, why don’t you have to enter a password for each page? The answer for that is simple; you have internet cookies to thank for that. An internet cookie or a

Read More

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.