Archive for the ‘Industry Trends’ Category

Emil Sayegh
By:


Date:
Oct 14, 2014
There are a number of analogies trying to explain how the cloud works. Sure, none of them are perfect, but they do help us understand a band of technologies that are largely metaphors themselves. So to get a better understanding of cloud hosting's benefits and functionality, let’s sum up some of the most popular analogies, and see what we can learn starting with perhaps the oldest: the power grid analogy. The cloud is like a power grid Say you have a building far out in… Read More
By:


Date:
Oct 7, 2014
The tech industry is notorious for marketing fluff.  From the beginning, cynics dismissed the term "cloud" as marketing hype. Even within the walls of a company where I once worked that now sells themselves as cloud innovators, the term "cloud" was laughed at. Those cynics haven’t gone away; they’ve just adapted because audiences continue to struggle with what’s hype and what’s real.  Meanwhile, analysts witness how the hosting industry struggles with true delivery on the cloud’s promises – companies encounter difficulties, lose control and never… Read More
By:


Date:
Oct 2, 2014
One of the most interesting developments in the cloud industry today is Docker.  If you’re looking to launch the most server application instances possible onto the least amount of hardware without managing a bunch of virtual machines to do it, you've probably heard the name "Docker" come up. And for good reason. With Docker, you can increase density, realize big gains in efficiency and set up nimble testing environments. It utilizes what are called "containers" to quickly deploy images without the large overhead of a… Read More
By:


Date:
Sep 29, 2014
Recently, the United States Department of Homeland Security’s Computer Emergency Readiness Team (US-CERT) issued an alert regarding CVE-2014-6271, or the ‘Shellshock’ bug, a severe flaw in the bash Linux shell.  This flaw allows attackers to gain complete control of a system with relative ease. A second vulnerability, CVE-2014-7169, was spotted while a patch was being written for the first. UPDATE 9/29/14: Three additional vulnerabilities, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, were discovered early yesterday. . The status for Codero customers as of 9/29: Managed Services: Your servers have… Read More
Emil Sayegh
By:


Date:
Sep 25, 2014
This article originally appeared on Wired.com's Innovation Insights, where experts cover the latest and greatest ideas for the next generation of business tech. A fitting place to start a conversation about our On-Demand Hybrid Cloud. Feel free to join the discussion by leaving a comment below. We have rapidly evolved into an on-demand society. People simply do not tolerate delays for goods and services. Just as consumers may opt to go through a drive-through instead of inside a restaurant, consumer behavior is forcing online businesses… Read More
By:


Date:
Sep 17, 2014
As your app or business grows, your backup solution needs to grow with it. The availability and the integrity of your data is paramount to your success. That’s why your data needs to be protected and backed up at all times. But in the excitement and rush of company growth, it’s easy to forget to revisit your data backup solution. The consequences of letting your backup solution stagnate, however, can be devastating. Imagine that the plane you’ve been riding has just caught fire. You grab… Read More
By:


Date:
Sep 16, 2014
If you think data loss won’t happen to you, think again. 70% of businesses have experienced (or will experience) data loss due to accidental deletion, disk or system failure, viruses, or some other disaster. And for those who don’t have a data backup solution, the consequences are dire. Of the companies that suffer a major data loss and don’t have a solid backup solution, 60% will shut down and go out of business within 6 months of the event according to Boston Computing Network. The… Read More
By:


Date:
Sep 11, 2014
The look in their eyes, their handshake, the tone of their voice, and all of the messages they’re sending with their body language– these are all part of the incredibly complex picture of recognizing who someone is, and ascertaining their intent. For centuries, business transactions were conducted in person. The intermingling of computers, the internet, and business, however, has forced face-to-face interaction to take a backseat to digital forms of identification. The earliest answer to this has been the password.  Yet as password management, standards,… Read More