Leading Your Organization Towards Successful Cloud Migration

The transition to the cloud is a big deal—for both you and your employees. The sheer number of moving parts involved in migrating to the cloud makes it difficult for companies to do so without experiencing some bumps along the way. But with proper...

Business Empowerment: Where Information Technology Intersects Growth

When individuals contemplate IT they typically reflect on the ways in which they have been exposed and impacted by IT services. Often services like setting up computers and fixing printers come to mind. These services frequently equate to “IT help”...

Active Directory Authenticated CIFS(Samba) File Sharing w/Ubuntu 20.04

A while back, we looked at setting up a CentOS 8 CIFS file server with Active Directory Authentication. This blog will go through the same exercise, except using Ubuntu Linux 20.04 LTS. While there are many approaches to making this setup work, we...

Linux Version 8 On Windows Subsystem for Linux

*This Blog is an updated version to the previously published blog Centos Linux Version 8 on Windows Subsystem for Linux

Last year we looked at installing CentOS 8 on Windows 10 WSL. In the past year, there have been many changes to both CentOS and...

Log4Shell: rethinking your environment and using external code

 

Log4Shell (CVE-2021-44228) struck fear in many IT departments, CISOs, and vendors - an easily exploitable remote execution vulnerability in a ubiquitous Java module used by many, many applications. Companies are still reeling from the impact and...

Subscribe Here For Our Blogs:

Recent Posts