Servers What is an API? In our technologically driven world, not a day goes by where we're not scrolling away on our phone's apps or surfing all corners of the web.... read more
Websites A history of HTML5 and how it works HTML made a transition into HTML5 way back in 2008. While it took several years to roll out, what came with it was a whole host of benefits from cleaner... read more
Servers How random access memory works Together with a computer's processor [https://www.fasthosts.co.uk/blog/evolution-cpu-too-much-process/] and storage [https://www.fasthosts.co.uk/blog/advantages-ssd-storage/], random-access memory is a crucial element in... read more
Servers Evolution of the CPU: too much to process? Whether it’s a laptop, desktop PC, or a high-powered server, microprocessors are the key component at the core of all types of computer hardware. Essentially, the central processing unit... read more
Business Data mining in ecommerce Data mining is a form of business intelligence and data analysis. It is the process of analysing data to draw useful conclusions or predictions from it. It’s a technique... read more
Cloud NGINX vs Apache Your web server responds to client requests and delivers web content through the internet to the user’s browser, making it crucial for any website or VPS project. Your chosen... read more
Security How to upgrade your version of PHP If you’re running websites with an out-of-date version of PHP, we recommend that you upgrade to PHP 8 or beyond. A newer version is more likely to be protected... read more
Servers Improve your web hosting: removing noisy neighbours Thumping bass, deafening TV, barking dogs and all-night shouting matches. If you’ve ever had loud, disruptive residents on your street or in your block of flats, you’ll be... read more
Websites How PHP powers WordPress With over 60 million websites and counting, WordPress is a monumentally popular choice when it comes to content management. Open source, simple to learn and highly customisable, it’s easy... read more
Cloud Cybersecurity: how does a VPN work? Now more than ever, the internet is playing a key role in every aspect of our lives, both in terms of work and entertainment. And with this increased use comes... read more
Security What the XSS is cross-site scripting? Recently we highlighted the risks posed by SQL injection. The other major type of injection attack is known as cross-site scripting or XSS. To understand cross-site scripting, you have to... read more
Security What is an SQL injection attack? SQL injection involves the insertion of SQL code into a website, commonly through the web browser address bar, or via a login form or search box. The code is then... read more
Websites 7 ways to improve page load times Whether you're a consumer or a business owner, your time is valuable. So when you click a website link and it buffers, that’s precious seconds you can’... read more