
Author Prodosh Banerjee on 22 June 2023 Prodosh Banerjee's blog
Author Prodosh Banerjee on 22 June 2023 Prodosh Banerjee's blog
The 5 most important considerations in going to “the cloud” explained. The fifth part of our series deals with the topic of Cost.
Author Prodosh Banerjee on 20 June 2023 Prodosh Banerjee's blog
The 5 most important considerations in going to “the cloud” explained. The fourth part of our series deals with the topic of Choice.
Author Prodosh Banerjee on 15 June 2023 Prodosh Banerjee's blog
The 5 most important considerations in going to “the cloud” explained. The third part of our series deals with the topic of Compliance.
Author Prodosh Banerjee on 13 June 2023 Prodosh Banerjee's blog
The 5 most important considerations in going to “the cloud” explained. The second part of our series deals with the topic of Control.
Author Prodosh Banerjee on 12 June 2023 Prodosh Banerjee's blog
The 5 most important considerations in going to “the cloud” explained. The first part of our series deals with the topic of Convenience.
Author Prodosh Banerjee on 17 May 2021 Prodosh Banerjee's blog
Organisations, whose functions are classified as “system relevant” by regulators (hospitals, banks etc.), suppliers to these organisations and those who provide important essential services, need to meet special criteria for business continuity: they need to be up and running again very quickly. In this blog post, we provide answers to the most important questions related to business continuity for cloud systems and services.
Author David Poole on 28 April 2021 David Poole's blog
You have heard of containers, but find them a bit of a mystery? Then this article is perfect for you. In it, we explain the concept and characteristics of containers. This helps to understand why containers are one of the big trends in IT.
Author Prodosh Banerjee on 24 March 2021 Prodosh Banerjee's blog
With this blog post, our goal is to help customers to avoid irrecoverable loss of data and computing resources, by making sure they have considered the scenarios they need to guard against and have recovery plans for these.
Author Prodosh Banerjee on 1 March 2021 Prodosh Banerjee's blog
Customer and other confidential company data is one of the most valuable assets in the digitalized economy. To protect this asset adequately in the cloud, there is currently only one secure strategy: to work with a European owned cloud infrastructure partner.
Author Prodosh Banerjee on 28 January 2021 Prodosh Banerjee's blog
The Kubernetes cloud is the perfect infrastructure for microservices architecture. It provides an out-of-the-box solution to get you up and running quickly on a managed public or on a dedicated private Kubernetes/OpenShift cluster.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category . |
cookielawinfo-checkbox-marketing | 1 year | This cookie is set by the GDPR Cookie Consent plugin to store the user consent for the cookies in the category "Marketing". |
cookielawinfo-checkbox-necessary | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Necessary" category . |
JSESSIONID | session | Used for Cross Site Request Forgery (CSRF) protection |
sdsc | session | Signed data service context cookie used for database routing to ensure consistency across all databases when a change is made. Used to ensure that user-inputted content is immediately available to the submitting user upon submission |
viewed_cookie_policy | 1 year | The cookie is set by the GDPR Cookie Consent plugin to store whether or not the user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_D83559EP8M | 2 years | This cookie is installed by Google Analytics. |
browser_id | 5 years | This cookie is used for identifying the visitor browser on re-visit to the website. |
split | 1 month | This cookie is used to evaluate the changes to the website by checking which multivariate test the user takes part in. |
Cookie | Duration | Description |
---|---|---|
bcookie | 1 year | Browser Identifier cookie to uniquely indentify devices accessing LinkedIn to detect abust on the platform and diagnostic purposes |
bscookie | 1 year | Used for remembering that a logged in user is verified by two factor authentication |
lang | session | Used to remember a user's language setting to ensure LinkedIn.com displays in the language selected by the user in their settings |
li_gc | 6 months | Used to store consent of guests regarding the use of cookies for non-essential purposes |
li_mc | 6 months | Used as a temporary cache to avoid database lookups for a member's consent for use of non-essential cookies and used for having consent information on the client side to enforce consent on the client side |
lidc | 24 hours | To facilitate data center selection |