Data Foundry Blog

6 Cost Reduction Strategies for Enterprise IT

Generic line graph showing cost reduction

While the focus of many CIOs is and should be on bringing technological competitive advantages to the business, cutting unnecessary costs is always something to keep in mind. Here are six IT cost reduction strategies that allow IT departments to use more of the budget for new technologies that foster business growth.

Read More

Backup and Recovery: Planning for Hurricane Season

hurricane season backup and recovery

Ensuring you have a backup and recovery plan in place before the season’s hurricanes hit is essential for companies worried about business continuity. The last thing you want is to permanently lose data, or to experience several hours or days of downtime due to a power outage. If you don’t already have a backup system in place, there’s no time like the present to get started. Read our blog post on choosing a backup strategy for more information on how to begin. If you have a backup strategy, keep reading to see if your plan is sufficient to properly restore your systems and applications in the event of a local disaster. Just because you regularly perform backups does not necessarily mean your systems will be properly restored when the time comes.

Read More

Liability and IoT Devices – A Legal Can of Worms

IoT devices legal liability

As many cybersecurity professionals are aware, the Internet of Things (IoT) is proliferating without any established legal framework or regulatory guidelines. According to a Forbes article, the IoT market is expected to reach $457 billion by 2020, up from $157 billion in 2016. The interconnectivity of network-enabled devices makes the IoT a can of worms when it comes to legal liability. U.S. regulatory agencies, such as the Department of Commerce, the FTC, and the FCC are a long way from establishing clear standards for IoT devices. Could the business that owns a connected device be held responsible for carelessness in the event of a data breach or an attack, or does liability fall only to the manufacturer or the software provider?

Read More

5 Best Practices for Choosing a Data Destruction / ITAD Service

data destruction ITAD service

Whether erasing or destroying data to meet compliance, recycle resources or to decommission old equipment, many companies choose to outsource asset disposal to third parties to minimize cost. Choosing an IT Asset Disposition (ITAD) service can be difficult. Making the wrong decision could mean facing a costly data breach incident and fines for not meeting regulatory compliance. Regardless of your industry, there are a few best practices you can follow when choosing an ITAD service provider to dispose of sensitive data.

Read More

6 Ways to Improve Availability for Edge Computing

edge computing in edge data center

No matter your definition of edge computing, the purpose is to bring processing power closer to the devices that communicate with it. For the purpose of this blog post, “the edge” is any storage or processing equipment that is not in a data center, i.e. computer equipment or machinery in your office, warehouse, or factory that stores or processes data from computers or network-enabled devices nearby.

Read More

Is Your Business Ready for GDPR? Here’s How to Get Started

Most in the IT world have heard about the EU’s GDPR (General Data Protection Regulation) and know that it comes into effect this year, but many U.S. companies have yet to make the necessary changes to be compliant. A study by TrustArc says 61% of U.S. companies surveyed had not yet begun implementation of GDPR compliance at the end of last year. The majority of those who are unprepared are smaller companies. What you may not know is that if your company has a website, the GDPR will likely affect you. Here’s a quick overview to get your company going in the right direction.

Read More

5 Cybersecurity Threats to Keep an Eye on This Year

cybersecurity 2018

According to the 2018 Thales Data Threat Report, which was compiled based on responses from over 1,200 senior security executives, 46% of U.S. companies experienced a data breach last year, nearly double the amount reported in 2016. After analyzing cybersecurity predictions and reports by CSO, MIT’s Technology Review, Infosecurity, Thales Security and 451 Research, we’ve compiled what we consider the top five threats to data security that cybersecurity professionals should monitor in 2018.

Read More

Is Colocation the Right Choice for Bitcoin Mining?

bitcoin mining in a colocation data center

So, you’ve had some success profitably mining bitcoin and other cryptocurrencies. You’ve continued to expand your operations, and now you’re looking for a space that can offer you all the power and cooling you need as you continue to expand. What could be better than renting space in a data center for bitcoin mining? As it turns out, not all data centers are created equal, and colocation isn’t the optimal solution for many bitcoin miners. Here’s why:

Read More

What Your CFO Wants to Know about Colocation

CFO walking tight rope between servers

So, your company is considering colocation as a viable IT infrastructure strategy. How do you convince your CFO that it’s the right move? Convincing your CFO revolves around risk aversion and cost management. To help your CFO see the benefits of your decision, address the opportunity cost of the other options you’ve evaluated, discuss capital expenditure (CapEx) versus operational expenditure (OpEx), and address how colocation minimizes risk and cost to your organization.

Read More

The Results Are In: 9 IT & Infrastructure Trends for 2018

Predictions for IT trends in 2018 are in, and results from forward-looking industry studies from IDC, Gartner, 451 Research and others are centered around the demands of digital business. Consumers demand speed, flexibility and a straightforward user experience that yields immediate results, or else. The competition is just a few clicks away. Consumer demands have led to the rise of the cloud, and now the edge. “The continuing digital business evolution exploits new digital models to align more closely the physical and digital worlds for employees, partners and customers,” says David Cearley, a fellow and vice president at Gartner. Here’s what these demands mean for IT in 2018:

Read More

Page 3 of 912345...Last »