spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

How to Build a Corporate Web Infrastructure

Written by SPK Blog Post
Published on January 28, 2011

As an IT professional, one question I’ve heard more than once is:   “Why do I need you – I can setup a computer, a web server, a database, etc”.    My answer varies based on the audience but essentially comes down to:  if you are entrusted with a company’s confidential information, you don’t want mistakes.  Mistakes cost money and business opportunity.  If you are an E-commerce site with credit cards or social security numbers, these mistakes can result in a disaster.

If you have a website just to show off pictures of the kids, read no further.   This setup would be overkill.   However, if you have information on your site that you don’t want everyone to see, there are good practices to ensure the site is secure and operational.  These consist of strong Linux server management, application server management, and overall IT engineering of the site so it can grow as customer demand grows.  Also, as visibility increases, the likelihood you are attacked increases exponentially.

Some of the keys to this are manageability, reproducibility and remote server management.  If your webserver crashes in the middle of the night, do you want to be down for an hour while driving to work?  Maybe it’s a 1 minute fix, pushing the power button?   If the server’s hard drive crashes, is there a backup to get it running quickly and correctly?   Is the hard drive redundant so that there is no loss?

Here’s a quick article, Managing Infrastructure for a Corporate Website, on the infrastructure and hardware required to setup a basic website for a company.   In future articles, I will expand on these areas with configuration of the various components.   As you increase volume, complexity is required.   However, to get into the more complex environments, a basic understanding of the fundamentals is required.

Latest White Papers

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

As a software developer, your main priority should be quickly and efficiently delivering software. The last thing you want is to worry about security threats. In this eBook, we will educate you on eliminating threat vectors with GitLab to secure your software supply...

Related Resources

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

As a software developer, your main priority should be quickly and efficiently delivering software. The last thing you want is to worry about security threats. In this eBook, we will educate you on eliminating threat vectors with GitLab to secure your software supply...

An Executive’s Guide to Strengthening Software Supply Chain Security

An Executive’s Guide to Strengthening Software Supply Chain Security

Modern software is assembled from a complex web of components, contributors, and tools, both internal and external. While this modularity accelerates development, it also expands the attack surface. For executives, a single breach in the software supply chain can...

Using Google Workspace to Manage Remote Engineering Teams

Using Google Workspace to Manage Remote Engineering Teams

The need for rapid innovation has led to remote engineering teams becoming the new normal. Engineering leaders are adopting technologies that enhance collaboration, supporting productivity from anywhere. Google Workspace offers a unified platform that enables...