Archive for the ‘Industry Trends’ Category

By:


Date:
Oct 2, 2014
One of the most interesting developments in the cloud industry today is Docker.  If you’re looking to launch the most server application instances possible onto the least amount of hardware without managing a bunch of virtual machines to do it, you've probably heard the name "Docker" come up. And for good reason. With Docker, you can increase density, realize big gains in efficiency and set up nimble testing environments. It utilizes what are called "containers" to quickly deploy images without the large overhead of a… Read More
By:


Date:
Sep 29, 2014
Recently, the United States Department of Homeland Security’s Computer Emergency Readiness Team (US-CERT) issued an alert regarding CVE-2014-6271, or the ‘Shellshock’ bug, a severe flaw in the bash Linux shell.  This flaw allows attackers to gain complete control of a system with relative ease. A second vulnerability, CVE-2014-7169, was spotted while a patch was being written for the first. UPDATE 9/29/14: Three additional vulnerabilities, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, were discovered early yesterday. . The status for Codero customers as of 9/29: Managed Services: Your servers have… Read More
Emil Sayegh
By:


Date:
Sep 25, 2014
This article originally appeared on Wired.com's Innovation Insights, where experts cover the latest and greatest ideas for the next generation of business tech. A fitting place to start a conversation about our On-Demand Hybrid Cloud. Feel free to join the discussion by leaving a comment below. We have rapidly evolved into an on-demand society. People simply do not tolerate delays for goods and services. Just as consumers may opt to go through a drive-through instead of inside a restaurant, consumer behavior is forcing online businesses… Read More
By:


Date:
Sep 17, 2014
As your app or business grows, your backup solution needs to grow with it. The availability and the integrity of your data is paramount to your success. That’s why your data needs to be protected and backed up at all times. But in the excitement and rush of company growth, it’s easy to forget to revisit your data backup solution. The consequences of letting your backup solution stagnate, however, can be devastating. Imagine that the plane you’ve been riding has just caught fire. You grab… Read More
By:


Date:
Sep 16, 2014
If you think data loss won’t happen to you, think again. 70% of businesses have experienced (or will experience) data loss due to accidental deletion, disk or system failure, viruses, or some other disaster. And for those who don’t have a data backup solution, the consequences are dire. Of the companies that suffer a major data loss and don’t have a solid backup solution, 60% will shut down and go out of business within 6 months of the event according to Boston Computing Network. The… Read More
By:


Date:
Sep 11, 2014
The look in their eyes, their handshake, the tone of their voice, and all of the messages they’re sending with their body language– these are all part of the incredibly complex picture of recognizing who someone is, and ascertaining their intent. For centuries, business transactions were conducted in person. The intermingling of computers, the internet, and business, however, has forced face-to-face interaction to take a backseat to digital forms of identification. The earliest answer to this has been the password.  Yet as password management, standards,… Read More
By:


Date:
Sep 9, 2014
The age of big data has just given us an accidental insight in the wake of a recent significant earthquake in California.  It turned out that data points from fitness trackers out in the public indicated how many people were awoken during the 3am Bay Area quake. That was a little bit of a peek into the future of the internet of things and an even bigger peek into how big data can open to doors to unexplored insights. Now, the finding that an earthquake… Read More
By:


Date:
Sep 4, 2014
At some point in our lives, we’ve all gone through some online account creation process and created a password.  Frequently, we’re required to choose a password that includes something like at least one capital letter, one number, et cetera.  The stricter the criteria, the more layers of security we think we’ve added to our passwords. However, that’s not actually the case. The math behind password security To understand why, let’s do some math. (It will be really simple, I promise.) One method of attempting to… Read More