It can happen. And it’s embarrassing. A visitor searches your site for a product and whatever their search terms are, no products are found. Instead of a missed opportunity to convert that visitor into a paying customer, consider showing them some products that might be of interest to them. Continue reading “Show Featured Products for Empty Search Results in WooCommerce”
When you buy a new tool, piece of equipment, or hardware device, in the box you’ll find a useful manual. The manual covers various methods to use device, safety procedures and troubleshooting tips. These manual books are an invaluable knowledge tool when learning to use new equipment – what about computers though?
When it comes to computers you rarely, if ever, get a physical manual. When you do it’s usually going to be very specific to the hardware of the device, but not the software. On UNIX based OS’s when you need to read about software you pull up the man pages. Short for manual pages, the man pages are a type of document that provides details on using various commands and applications. Man pages are super simple to use and can help you learn without Google! Continue reading “What are man pages?”
On an Ubuntu server the default firewall management command is iptables. While iptables provides powerful functionality it’s syntax is often seen as complex. For most users a friendlier syntax can make managing your firewall much easier.
The uncomplicated firewall (UFW) is an alternative program to iptables for managing firewall rules. Most typical Ubuntu installations will include UFW by default. In cases where UFW isn’t included it’s just a quick command away! Continue reading “Installing and using UFW on Ubuntu 16.04 LTS”
WordPress has a great GUI based installation process however some use cases call for CLI! Or maybe you just feel more at home in a terminal, either way this article will show you how to get your WordPress site setup with just a terminal, WP-CLI, and maybe a sprinkle of SSH.
So first things first, if you’re doing this locally fire up your terminal and if you’re doing this on a server connect to it via SSH. Now that you’re in CLI you want to get into the folder you’re installing WordPress to. From there you can get things rolling in WordPress! Continue reading “Installing WordPress using WP-CLI”
SSH, or secure shell, is a network protocol used for secure network communications and remote command execution. Common use cases for SSH include: controlling computers remotely and securing network services. A great example of securing other services is the SFTP protocol which uses SSH to securely connect to a server and FTP to transfer the files. Continue reading “What is SSH?”
Often we hear a lot of customers asking why, when their server is largely idle, much of their RAM appears to be in use.
When RAM is not needed for other functions, your server will load frequently-accessed files into memory in order to read them more quickly. When a file is loaded into RAM, the server can access the information orders of magnitude faster than from disk. A modern SSD disk can read files at up to around 500-700 MB/second, if the files are in sequential units. However, RAM can be read at GB/second rates; or even tens of GB/second.
If the RAM becomes needed for another function, these files are quickly flushed out of memory, and the RAM becomes available for other tasks. Continue reading “Why Is Most of My Memory Being Used?”
HIPAA, or Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any company handling protected health information (PHI) must ensure that all required security measures are in place.
Essentially, you can think of HIPAA like PCI compliance, except with health information instead of financial info. HIPAA compliance ensures that companies handling PHI follow proper security practices and procedures. Continue reading “What Is HIPAA Compliance?”
8 Tips to a Smooth Migration
A recent Liquid Web survey revealed that businesses are often held back from choosing a better hosting partner by the “what-if” situation when a migration presents. Nearly a quarter of consumers who decide not to switch to a new provider cited fear of the migration as the biggest reason for maintaining the status quo. Even if they believe that the new hosting provider would be better. Continue reading “The 8 Step Checklist to a better migration”
With the rollout of our new logo, new website, and general brand refresh we made some big changes. The most noticeable being our new logo and the websites fresh new look. We took this opportunity to update some of our product branding as well.
Our Storm Platform, and related products, is now referred to as our Cloud Platform. You’re still working off the same great Cloud hosting platform, just with a new name. Continue reading “From Storm to Cloud: Where did the Storm platform go?”
What Is PCI Compliance?
For any business that handles Credit Card data, in anyway, there is a set of rules and standards they must follow. These rules and regulations are called Payment Card Industry Data Security Standard. Or PCI-DSS for short, however this is often simplified to just ‘PCI Compliance’.
These standards were put in place by major Credit Card companies to ensure data security. These standardized rules greatly simplify securing credit card data as they allow businesses to track a single standard. In the past each credit card network had their own standard which made it hard for users to be compliant. Continue reading “What Is PCI Compliance?”