Data Foundry Blog

Confused by “the Edge?” 5 Ways to Define Edge Data Centers

edge computing and the Internet of Things

Edge computing and edge data centers are buzzwords popping up in IT publications all over the Internet, but what do they really mean? Edge computing is more straightforward, and has been simply defined as “data processing power at the edge of a network instead of in a cloud or a central data warehouse.” However, edge data centers are being defined in a variety of ways followed by outrageous claims that this new data center concept will “blow away the cloud.” Your preferred definition will likely depend on your industry. Here are 5 widely communicated ones to broaden your perspective.

Read More

What Is a Permanent DoS (PDoS) Attack?

A Permanent Denial of Service attack, or a PDoS attack, is denial of service via hardware sabotage. One method of conducting a PDoS attack is commonly referred to as phlashing. During such an attack, an attacker bricks a device or destroys firmware, rendering the device or an entire system useless. In this scenario, the victim has no other choice than to repair the device or buy a new one to restore operations. PDoS attacks have been a known possibility for several years, but these tactics haven’t yet gained traction with hackers. Our partner Radware, a leading cybersecurity firm, predicts in their 2017 Global Application & Network Security Report that this type of attack will be on the rise this year.

Read More

Stopping Petya & Global Cyber Attacks: 6 Precautions to Take

bitcoin ransom

Only six weeks after WannaCry, a similar type of ransomware has hit organizations and spread globally. Petya has mostly affected companies in Ukraine, but has also struck organizations in 64 other countries, including major companies in the U.S., such as Merck & Co and Mars, Inc. Experts are still working to understand Petya and its mechanisms of action, and no kill switch has been discovered yet. However, there are a few basic precautions announced by our partner Radware that your company or organization should take at a minimum to stop the spread of ransomware and other viruses.

Read More

VPLS Vs MPLS and How They Work Together

vpls vs mpls network

Many business professionals who are seeking the most cost-effective and efficient solutions for their networks are unclear about the differences between Virtual Private LAN Service (VPLS) and Multiprotocol Label Switching (MPLS) and the benefits they provide. While they are two different concepts, they work together to provide an efficient and cost-effective network solution for a growing number of organizations.

Read More

Test Your Data Center Knowledge

Do you know your way around a data center? Take our data center knowledge quiz to find out.

 Do you know your way around a data center? Take our data center knowledge quiz to find out.

Why a Hybrid Cloud/Colocation Strategy Is Here to Stay

Data Foundry's cloud connectivity diagram

Hybrid cloud has become the most widely implemented cloud strategy. According to RightScale’s 2016 State of the Cloud report, 82% of companies have adopted a hybrid cloud model. In this model, companies run part of their infrastructure in private clouds and run the rest in public clouds. At the same time, the colocation industry continues to grow. The industry brought in $25.7 billion in revenue in 2015. This number is predicted to reach $36.1 billion this year and continue to increase at a rate of 16%. The reason for this positive correlation isn’t a mere coincidence. Companies are finding that colocation makes an excellent foundation for a hybrid cloud model.

Read More

DDoS Hits Closer to Home in 2017: Trends & Emerging Threats

http 503 error, service unavailable

As a colocation company that provides a DDoS Mitigation service to customers, we keep current with DDoS activity and emerging threats in our industry and others. We’ve noticed more frequent attacks in previous months, and medium to large companies aren’t the only ones dealing with the onslaught. Smaller organizations are increasingly getting hit with DDoS threats and attacks. In the final quarter of 2016, the U.S. slid into first place to become the number one source country for DDoS attacks.

Read More

Data Privacy Day: 5 Things Your Business Can Do to Promote Data Privacy

data privacy day 2017 banner

Data Privacy Day is an international effort focused on promoting data privacy awareness that takes place on January 28 every year. The National Cyber Security Alliance (NCSA) leads promotional efforts for the U.S. This non-profit organization is dedicated to promoting a safer, more secure and more trusted Internet. In addition to educating consumers on how to protect their online privacy, the organization dedicates itself to showing companies how privacy is good for business. Here are 5 of their recommendations for promoting data privacy within your company:

Read More

How to Future-Proof Your Data Center Deployment

High density data center deployment

Choosing a colocation provider is often a multi-year commitment. While colocation does provide greater flexibility and scalability than building a company data center, the level of scalability and flexibility will differ between colocation facilities. It’s essential to choose a data center that will allow for your expansion, not only in terms of space but also in terms of power and density. Apart from choosing your provider, there are other things your team can do to future-proof your deployment. Here’s how you can help ensure your deployment is set up for future growth so you don’t have to worry about an infrastructure overhaul for several years to come.

Read More

7 Reasons Why Fortune 5 Companies Utilize Colocation

servers in colocation data center

If building and operating enterprise data centers was always the best course of action, all the companies that had the cash flow to do so would do it. There are several reasons Fortune 5 companies continue to engage colocation providers rather than exclusively running their own data centers. These are seven reasons we hear repeatedly from large corporations that utilize colocation as part of their IT strategy.

Read More

Page 5 of 9« First...34567...Last »