Strict Standards: call_user_func_array() expects parameter 1 to be a valid callback, non-static method collapsArch::get_head() should not be called statically in /home/tektegrity/www.tektegrity.com/news-and-articles/wp-includes/class-wp-hook.php on line 286
Jan 23
2018

We’re under attack! Because of a computer screen?

False Alarm

By John Lim, CTO

Over the weekend, the residents of Hawaii got some crazy alerts about a missile that had launched. People were in a panic…but it was a false alarm. How can clicking one button immediately send out an alert like this, causing a state-wide panic, with no precautions in place and no “false alarm” alert handy just in case? How does a mistake like that happen? more


Jan 23
2018

Backing Up Your Cloud

By Ruby Nahal, Senior Engineer

Pretty much Ruby Nahal, Engineereveryone agrees that IAAS and SAAS is the future for IT as more and more traditional infrastructure is being converted into cloud infrastructure, and more and more businesses are choosing SAAS over in house applications.

As such, there may be less stress imposed on the backups for infrastructure housed in these cloud offerings (Amazon web services, Azure). Yes, the cloud offerings do give us the luxury of scalability, flexibility, and redundancy.

That does not, however, take away the necessity of having a proper backup solution in place.

more


Jan 9
2018

How TekTegrity is addressing Spectre and Meltdown

https://i0.wp.com/hayro.la/wp-content/uploads/2014/09/guvenli-sifre-olusturma.jpg

By John Lim, CTO

As you may have heard, there are two major security vulnerabilities in the wild coined Spectre and Meltdown.  These two vulnerabilities may impact computer, phone and tablet processors dating back to 1995.  TekTegrity is working with major technology vendors to immediately address this situation.

What is TekTegrity doing for you?

more


Dec 15
2017

Your Log Has Something to Say to You

John Lim, CTO

By John Lim, CTO

When it comes to tech, most of us don’t have the need to look too deep into the systems we’re using. We go about the day using the system in place and don’t have to think twice about what’s going on under the surface.

But when something goes wrong and all of a sudden a server goes out or a system crashes, we hope that there are some precautions and hidden tricks up the sleeves of our IT company.

Enter: logs.

more


Dec 10
2017

Back it Up Like a Boss

By Ruby Nahal, Senior Engineer

Ruby Nahal, Engineer

The Story Behind Toy Story 2

We all know about the movie “Toy Story 2”. Pixar’s amazing creation where toys save the day. But did you know that the film was almost lost? And all because of human error. The primary files were accidentally deleted and when an attempt was made to recover from tape backups, it was discovered that nothing had been backed up for months due to systems failure. Luckily, Pixar was able to recover from a stray copy of files from the technical director’s personal backups.

We have all heard horror stories or experienced failed backup scenarios. From punch cars to Magnetic tape to the rise of floppy disks to the CD and evolution of Optical disks to the modern era of cloud backups – backup solutions and best practices have gone through a big evolution over the last century.

more


Dec 3
2017

Do this One Thing to Make 2018 the Safest Year Yet

2018 Cyber Security Predictions

By Russ Levanway, CEO

At the beginning of this year, I predicted trends for 2017 and discussed my single biggest concern: security. I talked about the changing security landscape and how crypto-ransomware is a real force to reckon with. Sadly, my predictions turned out to be true.

more


Nov 22
2017

The Service that Saved the Day When Kim Kardashian Broke the Internet

Ruby Nahal, EngineerBy Ruby Nahal, Senior Engineer

It all starts in the cloud

Cloud computing is the on-demand delivery of IT resources. This includes computing power, database storage, and applications through a cloud services platform via the internet.

A Cloud services platform owns and maintains the physical servers, the network-connected hardware required for these application services and the redundancy for high availability. You then provision the resources you need through a web console and you pay for what you use.

more


Sep 29
2017

The importance of Application-Aware Backups

Ruby Nahal, Engineer By Ruby Nahal, Senior Engineer

Roadblocks to recovery

Right after I came back to the office after maternity leave, I had the pleasure (NOT) of having to deal with a terrible disaster recovery. We were trying to recover a database application from crash-consistent backups and meant lots and lots of hours on the phone. Needless to say, by the end, my nerves were shot.

more


Jun 20
2017

Cyber Security: Mission Under Attack

Cybersecurity

By Russ Levanway, CEO

Action = Reaction

Recent events have tested the resolve of our mission ‘Productivity Enhanced, Lives Enriched’ and we’ve decided to do something about it.

more


May 15
2017

Machine Learning: Cybersecurity’s Most Promising Weapon

Machine Learning

By Russ Levanway, CEO

I recently returned from an HTG Peer Group conference where I met with a number of my colleagues from around the country to discuss trends in technology and business. Over the course of the conference, a very hot topic emerged: the benefits and liabilities of encryption.

Not that long ago, most traffic traveled across the internet unencrypted and relatively easy to intercept. Today, in order to secure traffic, the right side of the law has been using more and more encryption methods. For instance, when you visit a website and enter your credit card number, the page is always encrypted; when you enter a username and password, that’s also always encrypted. You will typically notice this via the yellow padlock next to the web URL in your internet browser.

more