By:


Date:
Aug 28, 2014
Security is hot topic on the internet right now and it’s only getting hotter.  In recent years, attacks ranging from simple “script kiddies” to complex, state-sponsored organizations (here’s a detailed report on one of them) have only increased.  The only way to keep a server or environment completely safe from internet-based attacks is to uncable it, and put it in the back of a closet.  Sadly, studies have shown that websites hosted on servers sitting in the back of a closet without an internet connection... Read More
By:


Date:
Aug 21, 2014
  Over the past few months, we’ve been working hard to release the Codero API. Now that it’s available to the public, developers and DevOps teams can now easily automate their Codero infrastructure with a few API calls. You can scale on the fly when needed, not when it’s too late. You can quickly and easily build your apps with API integration and automation tools. And best of all? It’s RESTful, simple, and incredibly easy to use. Here are some other benefits of the Codero... Read More
By:


Date:
Aug 19, 2014
As cloud computing and the hosting industry continue to gain momentum, there are now more use cases for Cloud than ever before. This is especially true with Hybrid Cloud use cases emerging for eCommerce scaling, big data, and batch processing. Integration, access and control have become paramount to managing environments and the ability of developers to innovate. Because of these changes, developers don’t just look at Cloud services and think about what their current workload looks like. Instead, they think about what new opportunities these... Read More
By:


Date:
Aug 14, 2014
At the heart of any company, earning the business of a customer is a very important target to go after.  However, when we get a positive note back from a customer, it is equally important to us. At Codero, a positive review, or a referral is viewed as the highest compliment we can get. It is our privilege to gain and serve customers.  Our focus, however, isn’t in seeking new business alone; we’re interested in gaining a customer’s loyalty and fostering an enduring business relationship... Read More
By:


Date:
Aug 12, 2014
As prevalent and sophisticated as IT security threats are today, one of the most significant threats doesn’t involve writing complex code, spreading a virus, or launching a denial of service attack. As attackers have known for a long time, one of the potentially most effective attacks is social engineering, the art of manipulating people to gain access or information to something the attacker is not supposed to have. This type of attack may be low-tech, but it’s just as dangerous as any other major threat,... Read More