25th Anniversary Savings | 25% Off Dedicated Servers*Shop Now
25th Anniversary Savings | 25% Off VPS Hosting* †††Shop Now
Limited Inventory: High-Performance AMD-Powered Servers Now Available.* Shop Now >
Dedicated Hosting Deals | From $99/moShop Now

Tag: Open Source

Reading Time: 6 minutes

Getting a custom software solution tailored perfectly to your company's needs can be costly. But it’s not just about the price. The more specific and complex your industry is, the more detailed and collaborative your efforts to explain it to developers need to be.

Continue reading →
Reading Time: 5 minutes

What is Chocolatey?

Chocolatey or Choco as it is sometimes referred to, is a free, open-source package manager for Windows that is very similar to Apt or DNF in the Linux realm. In other words, this is a program used for installing software via the Windows command line. It downloads a program, installs it, then it will check for updates, and installs those updates automatically if needed. Those who use Linux are quite familiar with the package management systems like this.

Continue reading →
Reading Time: 10 minutes

What is Samba?

Samba is a free and open-source software that allows files to be shared across Windows and Linux systems simply and easily. To be exact, it is an open-source implementation of the SMB/CIFS protocol.

Continue reading →
Reading Time: 4 minutes

osTicket is a free, open-sourced, and web-based customer support platform. In this article, we will show you how to install and configure the support ticket system osTicket on CentOS 7. While this guide will cover installation for unmanaged servers, Liquid Web’s fully managed servers with cPanel, Plesk, or InterWorx control panels allow for a one-click installation of osTicket.

Continue reading →
Reading Time: 5 minutes
1-gogs

Gogs is one of the most famous and widely used Git applications. It offers a low consumption alternative to other services like Gitlab or Gitea. Gogs is an open-source self-hosted Git service that provides all the essential features and benefits to set up a private and secure versioning control system.

Continue reading →
Reading Time: 5 minutes
1-gogs

Gogs is one of the most used Git applications. It’s an open-source self-hosted Git service that provides all the essential features and benefits to set up a private and secure versioning control system.

Continue reading →
Reading Time: 6 minutes

What is a Service Mesh?

A service mesh is a layer that aids the interaction between services or microservices. It helps control the flow of incidental information between services using a logic built into the service mesh. The mesh itself utilizes what’s called a sidecar proxy to share that data over the network.

Continue reading →
Reading Time: 5 minutes
DaaS

Introduction

As firms advance towards a more modern infrastructure, the Desktop-as-a-Service (DaaS) model is becoming an increasingly popular cloud-based system. Desktop-as-a-Service is a multi-tenant, cloud computing solution in which a service provider furnishes a virtual desktop to an end-user over the internet. A provider typically manages the infrastructure, including the security updates, available desktop applications, data storage, and backups. In specific instances, DaaS users manage these services individually. According to Gartner via Workspot:

Continue reading →
Reading Time: 7 minutes
Windows Active DIrectory

Introduction

This article will discuss the importance of Active Directory (AD), along with what it is, what it does, installation, and configuration. We must state in advance that there have been entire books written about AD. While we will touch on the significant aspects of its functionality, more in-depth information can be found online.

Continue reading →
Reading Time: 5 minutes

What is a Secret? 

k8s secrets

A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties. 

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434