Engineering Blog
What do our experts say?
The Deep Web
All of us have heard about the deep web some time, right?But… how it really works? What is TOR? Well, let’s find out. Presenter: Angel
Competing against the great migration
As a Director overseeing a large distributed team at Crossvale, I have seen #TheGreatResignation (really #TheGreatMigration) first hand and have some thoughts on how to keep it from
Log4j Vulnerability
Introduction Log4j is a Java library, used by many development and product teams and is a key Java-logging framework. It is widely used in business
Four Ways to Use Automation in CI/CD Pipelines
Preface: What is CI/CD? CICD, CI/CD Pipelines or Continuous Integration/Continuous Deployment is a systemic approach to promoting changes to your applications and environments using scripts or automation,
IT Solutions: Hiring an IT Consulting Firm vs. In-House IT Department
Introduction Many small businesses do not have the IT budgets to dedicate toward a full-time, fully skilled, in-house IT department. Even mid-scale businesses with healthy budgets must ensure that spend is well allocated. The
The Benefits of Using Managed IT Services
Overview There are not many companies left that still rely on the old pen and paper way of operating. Everything is cloud based, network based, and mobile. Companies
Things to Know About Red Hat Enterprise Linux
Organizations increasingly require their IT organizations to lead efforts to embrace digital transformation and compete effectively with the broader digital transformation occurring around them. This
What to Ask Your IT Consulting Company Before Hiring Them?
Computers and network systems are a critical part of any business, so making sure that yours are fully functional and ready to get to work
Three Simple Techniques to Add Security into the CI/CD Pipeline
Security is a huge deal these days, from small businesses to large corporations, data that is stored on servers must be secure, and that means