Digital Continuous delivery and continuous deployment Last week we discussed the process of continuous integration (CI) and how it’s becoming increasingly vital for software development. CI is the first half of a development process known... read more
Digital Continuous integration tools: Jenkins vs Travis CI Software development can be complicated, especially when things go wrong. Say two developers are working on a project. They are each coding on separate branches of the master code in... read more
Digital How to protect your domain from typosquatting So, you’ve registered your ideal domain name, and it perfectly sums up what you’re all about. However, when you’re first establishing your online brand, there are a... read more
Cloud Nagios server monitoring Managing a server is a 24/7 job. Traffic can spike, systems and applications can go offline, updates need to be installed, and RAM needs to be managed around the... read more
Digital Puppet: pulling the strings of your server If you’ve ever had to set up and maintain a server, the list of tasks can seem endless. You’ve got storage configuration, user account creation, and setup of... read more
Servers What is an API? In our technologically driven world, not a day goes by where we're not scrolling away on our phone's apps or surfing all corners of the web.... read more
Servers How random access memory works Together with a computer's processor [https://www.fasthosts.co.uk/blog/evolution-cpu-too-much-process/] and storage [https://www.fasthosts.co.uk/blog/advantages-ssd-storage/], random-access memory is a crucial element in... read more
Servers Evolution of the CPU: too much to process? Whether it’s a laptop, desktop PC, or a high-powered server, microprocessors are the key component at the core of all types of computer hardware. Essentially, the central processing unit... read more
Security How to upgrade your version of PHP If you’re running websites with an out-of-date version of PHP, we recommend that you upgrade to PHP 8 or beyond. A newer version is more likely to be protected... read more
Security What the XSS is cross-site scripting? Recently we highlighted the risks posed by SQL injection. The other major type of injection attack is known as cross-site scripting or XSS. To understand cross-site scripting, you have to... read more
Security What is an SQL injection attack? SQL injection involves the insertion of SQL code into a website, commonly through the web browser address bar, or via a login form or search box. The code is then... read more
Digital Open source vs SaaS Everyone loves the idea of open source. It’s all about great software, built by passionate people who really know their stuff, and it’s free! It is free, right?... read more