Not so grim up north for Softcat as it hails Manchester growth

by Donna Toomey, April 25th, 2014

It’s grow, grow, grow for our partners Softcat. They have a pretty simple recipe for success; happy staff leads to happy customers. The simple facts of their revenue figures shows it’s working, but we can also say from a lot of direct experience of working with Softcat and their customers that their staff love working […]

Read More


Congratulations to Amicus

by Donna Toomey, April 25th, 2014

Massive congratulations to our partner Amicus, who MSPmentor has rated as the Number 1 MSP in UK, Europe and EMEA. Very proud to work with Amicus, they’re a fantastic team of talented people and it’s great to see their good work being recognised. Welcome to the MSPmentor 501, our annual global ranking of the world’s […]

Read More

Excellent article explaining the difference between NLB and Application Load Balancing

by Donna Toomey, April 25th, 2014

Hats off to one of our competitors here for a brilliant explanation of the difference between NLB and Application Load Balancing. No need to make any bones about it, this is a straight-up excellent piece of writing from Lottie (even though she’s on the other side 😉 Application load balancing (which has also been given […]

Read More


edgeNEXUS ALB OpenSSL “Heartbleed” Resolution Advisory

by Donna Toomey, April 10th, 2014

About OpenSSL and the “Heartbleed” Vulnerability • For those of you not familiar with OpenSSL, it is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength general-purpose cryptography library. edgeNEXUS use OpenSSL as part of our ALB product to deliver SSL […]

Read More

Hyper-V telling fibs about Linux guest VMs

by Donna Toomey, April 7th, 2014

Well worth knowing about if you’re running Linux guest VMs in Hyper-V…. If Microsoft’s Hyper-V was found to treat Linux guests as second-class citizens, the resulting storm of controversy would probably generate enough heat and light to make a dent in some climate change models. So there are probably a few brows being mopped down […]

Read More


Collective Intelligence

by Donna Toomey, March 26th, 2014

The internet is just so fantastic. Just when you start taking it for granted you read an article like this… The thought that a 13 year-old can just read how to smash hydrogen atoms together to create Helium and then do it on a £2,000 budget, is astonishing. And when you think how quickly we’ve […]

Read More


Here’s the Google vs. Amazon pricing breakdown

by Donna Toomey, March 26th, 2014

AWS vs Google – cloud wars ready to break out big time God bless RightScale. It did the math to calculate how Google’s new price cuts compare with current Amazon Web Services pricing so I didn’t have to. And here are the results first comparing new Google pricing to one-year AWS Reserved Instances (RIs).

Read More


Microsoft Claims Exchange Doesn’t Need Preauthentication Security

by Donna Toomey, March 26th, 2014

Another useful article on the arguments around Exchange and Pre-Authentictaion TMG was needed back in the days when Exchange ran on Windows 2000, according to Taylor. However, Microsoft’s Trustworthy Computing security efforts, along with its Secure Windows Initiative and the imposition of its security development lifecycle coding approach have made such preauthentication security approaches optional, […]

Read More

Canada’s largest radiology partnership deploys edgeNEXUS to deliver scalable, resilient applications

by Donna Toomey, March 26th, 2014

Sharing a new case study where our load balancers are deployed as a key component of Medical Imaging Consultant’s (MIC) service delivery, helping ensure always available imaging archiving services to end users. Removing a single point of failure in our application delivery network & eliminating potential downtime makes the edgeNEXUS ALB-X VA solution incredibly valuable […]

Read More

Blanking Out Credit Cards

by Donna Toomey, March 26th, 2014

Cool video tutorial on using flightPATH traffic manipulation to blank out sensitive credit card information This video demonstrates how to deploy a flightPATH rule to edit the content of a web site on the fly. In this particular example, it is to blank out credit card numbers, providing an added layer of security. edgeNEXUS flightPATH […]

Read More

1 3 4 5 6 7 9