Cloud computing – risks and mitigation
Cloud computing enables education providers to deliver a high performance service, but it doesn’t happen at the flick of a switch. Like anything worthwhile, it requires skill and… […]
Cloud computing enables education providers to deliver a high performance service, but it doesn’t happen at the flick of a switch. Like anything worthwhile, it requires skill and… […]
This post explores the evolution of cloud automation and where and how cloud orchestration fits in to support a sustainable and robust operation. […]
Read More… from Cloud computing – automation and orchestration explained
An established edtech, explore how Moodle learning management system (LMS) can support students and educators with their collaborative learning and group communication in a hybrid… […]
The global cloud managed services market is rapidly expanding in terms of both extent and adoption; it is anticipated that by 2027 its value will reach a massive US$129.26b. In… […]
Automating the continuous integration and delivery process. Many organisations are reaping the benefits of increased agility and iterative speed of adopting DevOps tools and… […]
Available since May, have you been considering upgrading to the latest release of Moodle? Alternatively, are you looking to improve your organisation’s learning and development… […]
Read More… from Moodle latest version – what’s new in Moodle 3.11
This fourth and final post in our “Authentication Series” looks at SAML authentication, our SAML 2.0 Moodle plugin and how it supports SSO and single log out (AKA single sign-out… […]
This third post in our “Authentication Series” looks at password security from an organisation’s perspective: what to avoid and tips to help make your environment more… […]
Read More… from Tips to improve password security in your business
The Koha library software team at Catalyst is delighted to share the Koha latest version 21.05. This major release contains 703 changes: 6 new features, 248… […]
Multi-factor authentication (MFA) is a vital second layer of defence against password-based attacks, as it makes stealing users credentials so much harder. The reality is,… […]