Data Foundry Blog

How to Avoid DDoS Annihilation?

Guest Blog by Carl Herberger, VP, Security Solutions, Radware (a business partner of Data Foundry)

According to US Gov’t statistics, 60% of Small Businesses fold before a one-year anniversary of a cyber-attack.

Not even 18 months ago, the U.S. House of Representatives’ Small Business Subcommittee on Health and Technology Chairman Chris Collins (R-NY) led a hearing to examine the increased volume and complexity of cyber-attacks on small business. The concern was that new attack technologies and techniques present new challenges and threats and the interest of the committee was to investigate the role of the federal government in helping address cyber-security issues.

Read More ›

Join Data Foundry and Alert Logic for a Webinar On Infrastructure Availability

Alert Logic Webinar

Your business demands 24x7x365 infrastructure availability – but security incidents can halt your continuity for days, or even weeks. With the ever-increasing volume of security threats being launched, adopting a security management solution has become a requirement of doing business.

How do you integrate an affordable security plan that will deal with these concerns effectively, and allow you to spend most of your time doing business, not constantly reacting to security threats?

We invite you to join Data Foundry and our partner Alert Logic, to learn how our security management service can be the cornerstone of your availability strategy. This free web session will bring you up to date on:

  • The real costs of security-related downtime
  • Security at the infrastructure and application layers
  • Proven best practices to use as you formulate prevention and recovery strategies

Webinar Details

When: August 27th from 1:00pm – 1:45pm

What: “The Security Hole in Your Availability Plan”

Who: Wade Walters, Solutions Architect – Alert Logic and Thomas Adams, Director of Managed Services – Data Foundry

We hope to see you there!

Register Now

Presented by:

  • Data Foundry
  • Alert Logic

Houston 2: Cooling System Construction is Underway

Near record rainfall in the Houston area hasn’t slowed down our construction of the Houston 2 data center. We have now completed the western tilt walls, which means the front and back of the colocation pods are now finished. Also, the structural steel is nearing completion for 40,000 SF of of dedicated office space for customers.

Construction of one of the key features of the Houston 2 data center cooling system is underway. We have completed the main trench that will house the chilled water pipes that will feed the Computer Room Air Handler (CRAH) units. Illustrating one of the key benefits of a purpose built data center, we are able to deliver chilled water through a below slab trench. A below slab trench provides two key benefits: (1) in the event of a leak in the chilled water system, the trench will ensure no water enters the data hall; and (2) the chilled water piping will not interfere with the efficient flow of chilled air to our customer’s cabinets and high performance servers located on the raised floor.

Time-lapse video

Western Tilt Wall
Western tilt wall is complete!
Steel frame for office space
Structural steel frame for 40K SF of dedicated office space for customers.
Trench for chilled water pipes
Setting the stage for the trench that will hold chilled water pipes. These pipes will feed the Computer Room Air Handler (CRAH) units.
Adding dirt to raise elevation
Dirt is being added to raise the internal elevation for the entire pod enclosure by more than 4 feet. Illustrating where the finished floor height will be.
Roofing material
Materials are in order for strengthening and sealing the roof over the pods.

Next on the long list of projects will be sealing the roof, finishing slab work in the pods, and then closing off the east side of the pods. Be sure to check back for our next update in a couple of weeks!

HostingCon 2014 Conference Recap

Last month, members of the Data Foundry team made their way to Miami Beach for the 2014 HostingCon Conference. HostingCon is the premier industry conference for hosting and cloud providers where attendees can learn about the latest news, ideas and technology affecting their businesses. During the three day conference there were several educational sessions offered including a general session panel that included Data Foundry’s Co-Chief Executive Officer and Co-Founder, Ron Yokubaitis. The session titled, “The Post Snowden World One Year Later: What Has Changed?” drew one of the largest crowds during the conference. Ron, along with an impressive panel of five additional industry experts, shared unique perspectives around privacy and how the Internet infrastructure industry, must collaborate with others who have a stake in its success to show the world that the United States takes privacy seriously.

HostingCon Panel
HostingCon General Session Panel: From left to right: Michael Petricone – Consumer Electronics Association; Christian Dawson – ServInt; Martin Ammori – New American Foundation; Gregory Nojeim – Center for Democracy and Technology; Michelle Richardson – ACLU; Amy Stepanovich – Access; Ron Yokubaitis – Data Foundry

In addition to being featured during the Tuesday General Session, Data Foundry was right in the middle of the action in the exhibit hall during HostingCon. We had the pleasure of networking with a multitude of attendees including some of our long-standing clients. Discussions included everything from basic information about Data Foundry’s history to our services offered and the construction of our newest purpose-built data center in North Houston. We had a very productive time in Miami and look forward to seeing everyone again at HostingCon 2015!

Hurricane Season is Here, Are You Prepared?

2014 Hurricane Predictions

We are a little over a month into the 2014 hurricane season. Are you comfortable with your company’s Disaster Recovery plan?

In recent years we have seen everything from a hurricane season that produced only 2 hurricanes, to a season that generated 15. Regardless of the seasonal forecast, it only takes one hurricane to make a major impact on your critical IT assets. According to the Disaster Recovery Preparedness Council, 3 out of 4 businesses are at risk of failing to recover from a disaster or outage and receive a failing grade in their disaster recovery preparedness plan. Be sure to arm yourself with the knowledge, expertise and solutions of a seasoned data center provider, like Data Foundry. We are fully prepared and ready to protect you from whatever may come your way.

We created a Hurricane Disaster Recovery infographic that highlights the basics of a hurricane, illustrates the devastating financial impact of these storms and summarizes the critical considerations for selecting a data center for disaster recovery.

View our Hurricane Disaster Recovery infographic.

Data Foundry and the i2Coalition Submitted Comments to the FCC to Fight for Open Access

Data Foundry is proud member of the i2Coalition whose mission is to support “those who build the nuts and bolts of the Internet”. We are proud to have played a key role, along with other i2Coalition members, in drafting the i2Coalition’s comments about Net Neutrality that were submitted this week to the United States Federal Communication Commission (“FCC”) yesterday. We are fighting for an “Open Access” Internet that promotes innovation and competition, while respecting user privacy. An excerpt of the executive summary and link to the “Comments of the i2Coaltion” filing is below.

In May of 2014, the FCC made a historic decision to advance rules that will kill the “Open Internet” as we know it. Despite public outcry nationwide, the FCC betrayed Net Neutrality rhetoric, and instead approved the consideration for rules that would create a “two-tiered Internet.” That is, companies with deep pockets can pay for an “Internet Fast Lane” to ensure their traffic and content receive priority. Privacy is also greatly decreased because ISPs will inspect traffic so they can prioritize it.

Data Foundry strongly supports the coalition’s recommendation that the FCC reclassify the broadband transmission component as a Title II telecommunications service. The most effective way to protect and promote the Open Internet is to implement Open Access by reclassifying the broadband transmission component as a Title II telecommunications service. Open Access opens up the Internet to everyone and allows for robust competition.

The Internet thrives when a level playing field allows innovation to come from anyone with a good idea and the ability to act on it. Minimal barriers to entry encourage individual entrepreneurs, small businesses, and global companies to compete in the same arena.

We all must work together and remain vigilant in combating the powerful and well-funded groups that want nothing more than to end the Open Internet. The FCC has asked Internet users to weigh in on Net Neutrality by posting to the comments section on the FCC website.

We encourage everyone to post their comments to the FCC by July 18th to FCC to protect the Open Internet! Thank you!

Executive summary of the i2Coalition’s filing to the FCC:

The most effective way for the Commission to protect and promote the open Internet is to implement Open Access by reclassifying the broadband transmission component as a Title II telecommunications service. The NPRM’s proposed Net Neutrality rules attempt to alleviate the effects of an uncompetitive last mile by regulating broadband access, but Open Access strikes at the heart of the problem by opening up the network to robust competition. Open Access would bring competition back to the Internet access market and consumer choice would be the primary safeguard against abusive and discriminatory network practices.

Open Access was the Commission’s prevailing policy for over 40 years. The Computer Inquiries laid the groundwork for a vibrant Internet access market and the Commission’s policies were successfully adopted around the world. It was not until the Commission abandoned Open Access and broadband competition evaporated that the need for Net Neutrality regulations became apparent. The Commission’s decisions to classify broadband as an information service were based on predictions that competition and infrastructure investment would flourish without Open Access. This proceeding provides the Commission the opportunity to reevaluate whether Title I has produced the expected benefits. The evidence is clear that it has not and i2Coalition submits that now is the time to return to Open Access.

If the Commission does not reinstitute Open Access, then it should protect the open Internet with enforceable no-blocking and anti-discrimination rules based on its Title II authority. Section 706 does not provide a solid legal foundation for the Commission’s proposed rules and paid prioritization arrangements would be counterproductive. The incredible success of the Internet is largely attributable to the fact that it has always been a level playing field. Minimal barriers to entry have allowed innovation to come from big and small players alike.

However, a bifurcated Internet where the wealthy and powerful can purchase preferential treatment is anathema to the open Internet.

Paid prioritization also presents a dangerous threat to Internet privacy. The only way that broadband access providers can proactively prioritize edge providers’ traffic is by monitoring the content of their users’ online communications. The Commission should not sanction a prioritization regime that requires Americans to sacrifice their privacy or that allows broadband providers to discriminate against encryption tools. Protecting the open Internet means establishing meaningful rules that stop discriminatory practices. Open Access, the policy i2Coalition recommends the Commission undertake, would deter abuse through vibrant competition. For 40 years, the Commission’s Open Access rules were the foundation of the information services market and they succeeded in fostering competition, preventing discrimination, and incentivizing network investment. These are the results that Commission seeks in this proceeding and it can best achieve them by bringing back Open Access.

The link to the complete filing: http://www.i2coalition.com/wp-content/uploads/2014/07/i2Coalition-GN-14-28-Comments-140715.pdf

Data Foundry and Radware Host a Cyber Security Event

Data Foundry and Radware held a Cyber Security dinner last week in the Loft Room at the beautiful Brenner’s on the Bayou in Houston TX. We are very appreciative of our partner Radware and all of our guests who attended. The informal and eye-opening event regarding the latest cyber security challenges facing enterprise businesses was well received by all who attended. Carl Herberger, VP of Security with Radware, answered questions and led an open dialogue with all attendees. It was a great evening filled with valuable conversations.

5 Highlights from Carl’s presentation:
  1. Businesses are currently under repeated attack and need to approach the situation like being in a war. The enemy is showing a variation in tactics with increasing levels of sophistication. Not five years ago the average attack was 1-2 types and lasted a few hours to about a day. Today the average number of methods that cyber attackers use has increased to seven and the average length of an attack is about 5 months. This has increased significantly as people become more reliant on things like smart devices, tablets, and smart phones.
  2. Attacks are not merely criminal sometimes they are ideological and even state sponsored (i.e., the military).
  3. The enemy trusts that we put our faith in the illusion of security as opposed to knowing where we are vulnerable (Illusion versus reality).
  4. Cyber attackers are developing ways through the gathering of intelligence to use our own defenses against us. The world is so open now out of necessity the idea of a true defensible perimeter is obsolete. We must be ready to deal with threats once they are beyond our defenses.
  5. They are already laying plans for tomorrow and show efforts of coordination with other groups who may not share the same agenda but desire to achieve the same end. The tactics may vary but the target never changes.

The best defense against cyber security attacks is to be prepared by having a mitigation solution in place. Data Foundry can help you be proactive and stay ahead of potential threats with our DDoS mitigation solution.

Social mixer before presentation
Michael Jordan – Data Center Technician with Data Foundry, welcoming attendees before the presentation and dinner.
Presenter, Carl Herberger, VP of Security with Radware
Carl Herberger, VP of Security with Radware, starting his presentation on cyber security.
Wes Klaus, Data Foundry, discusses newest Houston Data Center
Wes Klaus, Director – Data Center Sales with Data Foundry, discussing the construction of our newest Houston Data Center, Houston 2.

Reinforced Concrete Walls Go Up at Houston 2

Our Houston 2 concrete tilt walls are moving into place – 16 of the 119 site cast reinforced concrete wall panels are up and will act as the “skin” holding the facility together. The use of concrete wall panels is one important feature that differentiates a purpose-built data center, such as Houston 2, from one that has been retrofitted to an existing building or warehouse. The concrete wall panels do not have windows and minimal doors to maximize the structural integrity of the 185 mph wind rated facility.

Time-lapse video

Raising Concrete Wall
All clear to lift. Each site cast concrete wall will weigh between 66,000 and 68,000 lbs each.
Raising Walls Slow And Steady
Slow and steady is the order of the day. Each wall must be carefully controlled for the safety of the crew and the integrity of the structure.
Hydraulic Crawler Crane
Heavy lifting – the 30 ton hydraulic crawler crane has a 100 ft boom and can lift up to 210 tons.
Welding wall to frame
Welding it in place. A welder attached contact points to the steel frame work of the building.
Front exterior wall
The front exterior of Houston 2 is beginning to take shape.

The dog days of summer are upon us and our construction teams are moving right along. Stay tuned as we continue to provide updates on the Houston 2 project. Foundational concrete slab and roofing milestones are next on the list!

Houston 2 is Taking Shape

Construction of Houston 2 is moving forward extremely well! Over the past couple of weeks, crews made significant progress as the structural steel has been put in place, additional conduit has been positioned and the site cast concrete walls are set to be put in place at Houston 2. Construction of the structural steel is a major milestone because it acts as the “skeletal system” of the data center. It’s now getting easier to visualize exactly how massive this premium data center will be.

Panoramic Photos

View from inside Pod 1
Current view from inside Pod 1
Pod 1 roof deck
Pod 1 roof deck skyline view

Structural Steel Frame

Generator yard
Corner of the generator yard that will house scalable 2.25 MW N+1 diesel generators looking east at Pod 1
Roof Pod 1
Reinforced structural steel beams supporting the roof of Pod 1
Bell Pier and Steel Support
Bell Pier and Steel Support (Behind that you see the depressed slab and chilled water trench)
Pod 1 ground
One of the Primary Grounds for Pod 1
High voltage – Medium voltage transfer
High voltage – Medium voltage transfer. This is looking from inside Houston 2 out into the generator yard
Conduit
Sub-foundation conduit for electrical transfer, telecommunications and plumbing

Tilt Wall Casting Forms

Concrete wall forms
Casting forms for concrete wall panels
Wall forms aerial view
Aerial view of casting forms for concrete walls

Despite torrential rainfall in the Houston area, construction continues to hit deadlines and we march toward our next milestone, which will be the site cast concrete walls going up. Stay tuned for our next Houston 2 construction update in a couple of weeks!

Are You Prepared for Hurricane Season?

Hurricane season is upon us, and according to the National Oceanic and Atmospheric Administration’s Climate Prediction Center there is a 70 percent likelihood of 8 to 13 named storms, of which 3 to 6 could become hurricanes, including 1 to 2 major hurricanes. Of course, it only takes one storm to put an unprepared business out of business.

According to the Disaster Recovery Preparedness Council, 3 in 4 companies are at risk of failing to recover from disaster or outage due to an enormous shortfall in DR preparedness.

Hurricane Ike – September 12th, 2008
Hurricane Ike – September 12th, 2008

Does your business have a disaster recovery plan in place for your critical business systems?

Having a solid disaster recovery plan in place is critical for reducing the business risks associated with being hit by a hurricane. Evaluating and testing your disaster recovery plan at least once a year helps to identify any gaps, as well as ensure that information is up-to-date and no fundamental components have changed.

According to the business continuity experts at ImpactWeather, there are five critical areas every company should consider when evaluating their disaster recovery plan. These areas are:

  1. The Plan Itself
  2. Secondary Site Location
  3. Disaster Recovery Office Space
  4. Connectivity
  5. Support

We have refined these five areas and developed a Disaster Readiness Checklist. It also offers links to detailed online resources to further help you assess and refine your disaster recovery plan.

Please take a few minutes to review this free online checklist.

Page 1 of 712345...Last »