By:


Date:
Sep 9, 2014
The age of big data has just given us an accidental insight in the wake of a recent significant earthquake in California.  It turned out that data points from fitness trackers out in the public indicated how many people were awoken during the 3am Bay Area quake. That was a little bit of a peek into the future of the internet of things and an even bigger peek into how big data can open to doors to unexplored insights. Now, the finding that an earthquake… Read More
By:


Date:
Sep 4, 2014
At some point in our lives, we’ve all gone through some online account creation process and created a password.  Frequently, we’re required to choose a password that includes something like at least one capital letter, one number, et cetera.  The stricter the criteria, the more layers of security we think we’ve added to our passwords. However, that’s not actually the case. The math behind password security To understand why, let’s do some math. (It will be really simple, I promise.) One method of attempting to… Read More
By:


Date:
Sep 2, 2014
Whether you’re an internal IT department for an enterprise, or an internet-enabled business, there’s a good chance that you’ll encounter the classic “build versus buy” decision for your data center services. That is, building-out a facility of your own, or buying services from a leading technology provider instead. When considering whether your operations may require their own data center or whether you can gain a greater value by leveraging a hosting provider, you must first begin by evaluating your needs. Are you streaming video? Running… Read More
By:


Date:
Aug 28, 2014
Security is hot topic on the internet right now and it’s only getting hotter.  In recent years, attacks ranging from simple “script kiddies” to complex, state-sponsored organizations (here’s a detailed report on one of them) have only increased.  The only way to keep a server or environment completely safe from internet-based attacks is to uncable it, and put it in the back of a closet.  Sadly, studies have shown that websites hosted on servers sitting in the back of a closet without an internet connection… Read More
By:


Date:
Aug 21, 2014
  Over the past few months, we’ve been working hard to release the Codero API. Now that it’s available to the public, developers and DevOps teams can now easily automate their Codero infrastructure with a few API calls. You can scale on the fly when needed, not when it’s too late. You can quickly and easily build your apps with API integration and automation tools. And best of all? It’s RESTful, simple, and incredibly easy to use. Here are some other benefits of the Codero… Read More
By:


Date:
Aug 19, 2014
As cloud computing and the hosting industry continue to gain momentum, there are now more use cases for Cloud than ever before. This is especially true with Hybrid Cloud use cases emerging for eCommerce scaling, big data, and batch processing. Integration, access and control have become paramount to managing environments and the ability of developers to innovate. Because of these changes, developers don’t just look at Cloud services and think about what their current workload looks like. Instead, they think about what new opportunities these… Read More
By:


Date:
Aug 14, 2014
At the heart of any company, earning the business of a customer is a very important target to go after.  However, when we get a positive note back from a customer, it is equally important to us. At Codero, a positive review, or a referral is viewed as the highest compliment we can get. It is our privilege to gain and serve customers.  Our focus, however, isn’t in seeking new business alone; we’re interested in gaining a customer’s loyalty and fostering an enduring business relationship… Read More
By:


Date:
Aug 12, 2014
As prevalent and sophisticated as IT security threats are today, one of the most significant threats doesn’t involve writing complex code, spreading a virus, or launching a denial of service attack. As attackers have known for a long time, one of the potentially most effective attacks is social engineering, the art of manipulating people to gain access or information to something the attacker is not supposed to have. This type of attack may be low-tech, but it’s just as dangerous as any other major threat,… Read More