Last month, I wrote about five things you can do to ensure shorter load times [1] for your sites. Today I want to look at a sixth, positioning your s...
Nobody ever accused game developers of having an easy job. But over the past decade, more powerful and expensive hardware, as well as social games ho...
Business continuity, like its little sibling backups, is too often overlooked until it’s too late. But with the cloud on their side, IT and business ...
Third-party cloud solutions offer a truly transformational cost advantages over traditional on-premise hosting – but you’re not going to capture most...
The only way to stay safe on the internet is by helping each other minimize security risks. So as a precaution, I want to make you aware of a situati...
LeaseWeb is always striving for the best customer experience and we believe that putting you in the driver’s seat is a key factor in this. After all,...
Having your IP address end up on a so called ‘blacklist’ can be a troublesome experience, especially when not anticipated. In most cases, it is a sig...
Last time, we talked about how spammers gather email addresses [1] and then make money from them. This time we’re looking at a few more things you ma...
Where does spam come from? Why do people send it? And what can we do to stop it clogging up our inboxes? This two-part article explores these issues ...
LeaseWeb set up the Community Outreach program [1] in 2010, aiming to bring together non-profit organizations who combat online abuse of all shapes a...
The first half of 2015 saw a 50% increase in DDoS attacks. They are not only becoming more frequent but they are getting more sophisticated too. On a...
Organizations are increasingly dependent on their digital infrastructure. At the same time, these organizations seem to be more vulnerable than ever ...
“Should we keep IT security in-house or is it better to outsource?” This has long been a thorny issue for organizations. Recently, it was one of the ...
* *After my previous blog last month [1] we were still looking out for any news about solutions for the Safe Harbor invalidation. Since the press re...
On January 1, 2016, the new Dutch Law on Data Breach Notifications came into effect. Organizations – both companies and government agencies – are now...
In October last year, the US Safe Harbor regime was invalidated by Europe’s Court of Justice, meaning that personal data of Europeans could no longer...
For businesses or organizations whose data is particularly sensitive or mission critical, disk fault tolerance and optimized performance aren’t luxur...
A security bug affecting Linux versions 3.8 and higher was recently identified. Although this bug (CVE-2016-0728) was first introduced into the Linux...
Customers want content delivered instantly. Whether it’s articles & videos or any type of advertising inventory pushed from a Supply-Side Platform (S...
Because the market continues to change, LeaseWeb keeps developing new and innovative solutions to provide our customers with the best hosting solutio...
Administrator
— December 2015
— 509
views
About us
Write a small text here for when new visitors find your website
through your blog entries, referenced in Google.