best practices


Cloud Office

Sending email to many recipients is a common practice of spammers. As a result, most mail providers have strict rules regarding mail content sent to many recipients. It can be difficult to distinguish your email from typical mass...
0 Comments
Filed in: Rackspace Email, Filed in: Exchange
Sending person-to-person email is an integral part of our daily activities, but it’s getting harder to ensure that the mail you send gets to the Inbox of the people you intended. Stricter and more sophisticated spam filters flag...
0 Comments
Filed in: Rackspace Email, Filed in: Exchange

Hosted Exchange

Sending email to many recipients is a common practice of spammers. As a result, most mail providers have strict rules regarding mail content sent to many recipients. It can be difficult to distinguish your email from typical mass...
0 Comments
Filed in: Rackspace Email, Filed in: Exchange
Sending person-to-person email is an integral part of our daily activities, but it’s getting harder to ensure that the mail you send gets to the Inbox of the people you intended. Stricter and more sophisticated spam filters flag...
0 Comments
Filed in: Rackspace Email, Filed in: Exchange

Rackspace Email

Sending email to many recipients is a common practice of spammers. As a result, most mail providers have strict rules regarding mail content sent to many recipients. It can be difficult to distinguish your email from typical mass...
0 Comments
Filed in: Rackspace Email, Filed in: Exchange
Sending person-to-person email is an integral part of our daily activities, but it’s getting harder to ensure that the mail you send gets to the Inbox of the people you intended. Stricter and more sophisticated spam filters flag...
0 Comments
Filed in: Rackspace Email, Filed in: Exchange

Security Tools

When you modify a firewall configuration, it is important to consider potential security risks to avoid future issues. Security is a complex topic and can vary from case to case, but this article describes best practices for...
0 Comments
Filed in: Cloud Hosting

Security

The first step after creating a Linux cloud server should be to set the security on it. This crucial step must be performed on every server to prevent hackers from obtaining unwanted access. The result is a more secure...
0 Comments
Filed in: Cloud Servers
DISCLAIMER FOR MANAGED OPERATIONS CUSTOMERS

To ensure that we have access to your server when needed, we request that you do not change these configurations. When connecting to your server, Rackspace support will log in as the...
0 Comments
Filed in: Cloud Servers

Performance

What is Cloud Files used for?There are many ways to utilize Cloud Files, but it is strongest when functioning as unlimited object storage on the Cloud, or when used as a website accelerator with the Content Delivery Network (CDN...
24 Comments
Filed in: Cloud Files