Search Content

Displaying 1 - 20 of 139

… A question of risk Submitted by John Locke on Wed, 07/27/2011 - 14:24 How … protect themselves from data loss: … A question of risk

… A question of risk Submitted by John Locke on Wed, 07/27/2011 - 17:10 How … article on Freelock.com Client Spotlight … A question of risk

… it has been in production before it was discovered. We tag and back up the production site before deploying any … when you need them. And we also do a lot with Rackspace Cloud Servers -- we think there are really good reasons in …

… Is your company’s website at risk of being hacked? We agree that there is a lot that a … business forward.     …     … Is your company’s website at risk of being hacked? …

… automation using the Drupal #AI module -- automatically tag your articles. With the AI module, its AI Automators … integrations, the great thing is you can easily edit the tags later if you want to highlight something specific, or if …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …

… Drupal deployment with Git Flow Submitted by John Locke on Tue, 02/05/2013 - … doing development during the sprint can find any resulting problems that arise out of the updates. git flow feature … Submitted by Shawn (not verified) on Thu, 02/14/2013 - 10:16 Permalink Database handling Would love more detail on …

… to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have … back to development and re-roll the release. git log/git tag -- identify the current state of the code base -- should …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … Once the dev site is updated, we create a new release tag and push it into our central git repository, where …

… Loss of your data, or digital photos. Do you want to risk these things? In many cases, a weak password is all that … any particular system. Assess your risks There are low risk, and high risk computer systems. To avoid having 30 different passwords …

… and changing can be done after the site has launched. Low Risk There's lots of things that can go wrong with a … We do all kinds of things to make our service as risk-free as possible, including: Banning all use of insecure …

… No matter what service you use, you need to consider the risks associated with that service -- many of which have … Drupal or WordPress site! Disaster Recovery Drupal Planet Risk Secure hosting environments Preventing Attacks Add new …

… your customers' requests, and help you succeed online. Low Risk. With a low up-front cost and regular monthly billing, … any results. Our attention to security and our focus on risk management minimize the chances of catastrophe as the …

… backups don't matter. Being able to recover from whatever risk you face is what matters -- backups just help you do … really need is a "Disaster Recovery plan" that includes a risk matrix -- a summary of what risks you face, and steps to … just neglect keeping their computers up-to-date and not risk losing all of their data. Websites are next. We've seen …

… materials." The reason? You are taking on all the project risk. Risk is, after all, the big question when it comes to any …

… for ongoing service, updates, and improvements? How much risk is associated with a particular platform, based on what … work at lower cost over the long term, and lower their risks while we’re at it. If it’s in a neighboring technology, …

… processing service, and Now, everybody's talking about the risk to the consumer of doing online purchases, and all of … having credit cards. But consumers really don't have any risk here at all, thanks to Senator Proxmire thirty years … are great for consumers, but becoming more and more of a risk for merchants. Unless something is done to place the …

… metrics to success and selecting a vendor, then finally risk tolerance and disaster recovery planning. We welcome … metrics to success and selecting a vendor, then finally risk tolerance and disaster recovery planning. We welcome …

… Since we can never speak to our services better than our clients, here is a testimonial from the webteam management at … it only strengthens your ability and commitment to the client. Thank you Freelock!” No, thank you Pencol!! … Since we can never speak to our services better than our clients, here is a testimonial from the webteam management at …

… we think the best practice is to run it through a virus filter and SpamAssassin set to reject or discard the most … that have a lower score. Dspam : Dspam is a Bayesian mail filter, and for those who get more spam than the above … nothing that beats Dspam. With Dspam, you simply tell the filter when it's wrong, and it learns through pure …