Data Foundry Blog

What Is a Zero-Day Attack? (and How to Minimize Risk)

In the digital age when nearly every business and industry is powered by sophisticated technology, updates are a fact of life. Software developers are constantly releasing new versions of their solutions while hardware manufacturers are consistently seeking new ways to improve their products.

Read More

Del Valle High School IT Group Tours Data Foundry’s Austin Data Center Campus

Del Valle IT and CS students

High school students from Del Valle High School’s computer science and IT programs visited our data center campus in southeast Austin on Friday to tour the facilities and get an idea of what it would be like to work in a data center.

Read More

5 IT Infrastructure Monitoring Tools that Make Your Job Easier

IT infrastructure monitoring

IT professionals are responsible for making sure all their organization’s hardware, software and network resources are running optimally and well-secured. However, keeping up with your IT infrastructure can be challenging — especially if, like many organizations, you have a hybrid infrastructure model. Fortunately, IT infrastructure monitoring tools can provide the insight you need to monitor resources across your environment to ensure everything is working as it should.

Read More

How IoT Is Changing the Oil and Gas Industry

oil platform, oil and gas IoT Over the past few years, the Internet of Things (IoT) has transformed the way nearly every industry transmits, collects and uses data — and the oil and gas industry is no exception.

Energy companies who’ve invested in this new technology are enjoying cost savings, better-streamlined processes, more accurate forecasts for demands and other crucial advantages. And that’s likely why global IoT in the oil and gas market is expected to reach nearly $40 billion by 2023, according to a report from BIS Research.

Read More

Get Uninterrupted Sleep with a Skilled Remote Hands Team

data center technician providing remote hands service

Consider this inconvenient scenario: It’s 3 a.m., and you’re snuggled into bed, a hundred miles away from your organization’s servers, when an urgent call wakes you. Something has gone awry, your network has crashed, and no one else is available. Begrudgingly, you head out in the dark for the long trek to the data center and spend the next several hours troubleshooting and replacing equipment.

Read More

Secure Edge Computing Spurs Innovation for Banks & Financial Firms

IoT devices and edge computing for banks

When we think of the Internet of Things changing our lives, we often think about smart watches, smart homes and smart cars, but IoT devices are also changing banking, manufacturing and heavy industry too. The IoT and edge computing are changing the way the banking industry does business, making everyday banking, trade and wealth management more transparent, accessible and efficient for customers.

Read More

Choosing the Right Disaster Recovery Services: Traditional vs Cloud

cloud vs traditional disaster recovery services

If you haven’t yet developed a disaster recovery plan for your business, you likely haven’t suffered a major outage yet. The cost of downtime is in the thousands per minute for large companies and thousands per day for small companies (The Ponemon Institute, 2016). For companies whose customers depend on your services being available 24×7, outages result in a loss of customer confidence and can even damage your reputation in the marketplace. A helpful starting point in determining whether cloud or traditional disaster recovery services are best for your business is to determine your budget by finding your cost of downtime and your recovery point and recovery time objectives (RTO and RPO).

Read More

An Overview of 2019 Technology Policy in the Texas Legislature

The Texas Legislature meets every odd-numbered year in the city of our headquarters – Austin. We are excited to track technology policy development in the 2019 session. We hope to see several bills pass that move our state forward in terms of keeping policy up to speed with innovation. This year we are particularly focused on bills submitted in the areas of stingray technology, drone surveillance and cybersecurity.

Read More

Why Data Provenance Could Be the Next Big Thing for Cybersecurity

certified authentic

Data provenance is the documentation of the origin of a data product or piece of content. Data provenance answers questions of where a particular piece of information came from, what tools were used to create it, and whether or not it was modified over time. This information is often stored in meta data and can be used to verify a data product’s authenticity.

Read More

2018: A Year in Review

It’s been an exciting year for us at Data Foundry. We opened our third data center in Austin, we’ve attended and sponsored some interesting events, and we’ve seen growth in some of our ancillary services. As we prepare for growth and change in 2019, we are looking back on events and milestones for the year.

Read More
Page 1 of 2212345...1020...Last »