When it comes to business messaging platforms, you want to find a good balance between cost, features and security. Slack is great, but it’s a little pricey since it uses a pay-per-user model. Fortunately, there are messaging platforms that are feature-rich and won’t clean out your company piggy bank as your team grows.
Rocket.Chat is a free, self-hosted, open-source alternative to pricier messaging programs like Slack. Not only does it not impact the bottom line, it’s a secure platform that lets you control your chat history.
If you’d like to make the platform more secure, while also understanding what the application and all of its pieces are doing, you can try this method to deploy Rocket.Chat without using Docker on CentOS 7. Continue reading
We all have files on our computers right now that we aren’t using and may not have accessed in months. Whether sitting in the downloads folder or saved on the server, these files exist and they aren’t being managed.
This is a guest post from Josh Reichardt, DevOps Engineer with about.me and the owner of Practical System Administration
, where he writes about scripting, devops, virtualization, hardware and policies. Follow him on Twitter at: @Practical_SA
If you have worked in IT for any period of time, you have likely heard about how important documentation is. However, if you’re just starting out in the industry, you may have no idea how to effectively “do” documentation.
Having spent the last 6 years in an administration/engineering role, I have learned a number of important lessons and developed a few techniques that have helped me write documentation in a clean, consistent and usable way.
This list is not meant to be a comprehensive solution, but more of a guide that allows you to pick and choose the pieces that are important or applicable in your environment and improve your documentation. Even if you already have a firm grasp on your documentation skills, I believe in looking for new and improved ways to do things — the more you know, the better.
Cloud sprawl, otherwise known as Shadow Cloud or Bring Your Own Cloud, is an emerging problem for IT due to the growth of easy-to-set-up cloud providers. While typically a Shadow IT concern, it can also rear its ugly head thanks to a lack of IT policy and oversight into cloud usage.
What exactly is cloud sprawl? It’s unknown, unauthorized and unregulated cloud usage by the members of an organization.
You might think that for every 1 authorized cloud provider, you’d have 1-2 unauthorized cloud providers, meaning roughly 50% of your cloud usage is unauthorized.
Brace yourselves, because in all actuality, more than 80% percent of your current cloud providers are probably unauthorized per Cisco. For some companies, it can be 25 times what they estimated according to recent surveys.
All this said, it’s important to tackle this problem ASAP, before it becomes an unwieldy nightmare tomorrow. Continue reading
Businesses seek out enterprise-level file management platforms for many reasons. One is ease-of-use in sharing files, another is to have a unified place for server and cloud storage and yet another is to have a backup option in case of disaster.
But most importantly, businesses look for file management platforms because they offer a secure solution for the sensitive data that comes and goes from their organizations every day.
How is it these platforms keep data and files secure?
It all started with a home-based server. A home-based server that carried state secrets.
Up until the most recent occupant, few others in the position of Secretary of State had used the official state.gov email address to conduct government business. This was pretty typical of the holders of this office. However, most former Secretaries of State didn’t rely on a private server, hosted in a Chappaqua home, to conduct official government business.