Data Foundry Blog

Can Cryptocurrency Mining by Night Be Profitable for Companies?

cryptocurrency mining cart

Bitcoin and cryptocurrency mining in general has gone from being an arcane hobby to the bread and butter of currency mining startups that are now evolving to be major blockchain technology solutions providers, such as PeerNova. Some individuals and companies that have tried bitcoin mining on the side  have come forward to say that it hasn’t been worth the effort or the cost. We wondered why some have been successful while others have not, and could cryptocurrency mining be a profitable endeavor for companies on the side? The answer: It depends.

Read More ›

Choosing an Infrastructure Model: Colocation Vs Cloud

server cabinets moving to the cloud

Are you considering moving to the cloud? You aren’t alone. All the hype would have you believe that companies are moving assets to the cloud in droves and shutting down their data center operations. This couldn’t be further from the truth. The Uptime Institute’s 2016 Data Center Industry Survey found that 71% of companies maintain assets in enterprise-owned data centers, 20% maintain assets in colocation facilities and just 9% keep assets in the cloud. While there is an increase in the adoption of cloud services year over year, this growth appears to be conservative.

Read More ›

6 Differences Between Cloud Security & Data Center Security

cloud security

Cloud security has improved over the years with cloud providers working hard to minimize risk and a variety of third party vendors launching comprehensive cloud security tools, such as Alert Logic’s Cloud Defender and Trend Micro’s Deep Security. So, is the cloud now just as secure as running your own infrastructure in a data center? Here are some significant differences between cloud security and data center security.

Read More ›

7 Tips for a Successful Application Migration

With the ever-increasing adoption of hybrid cloud infrastructure models, application migrations have become a common occurrence. Whether you are migrating an application to your public or private cloud, these 7 tips can help you avoid costly and time-consuming errors in planning and execution.

Read More ›

Confused by “the Edge?” 5 Ways to Define Edge Data Centers

edge computing and the Internet of Things

Edge computing and edge data centers are buzzwords popping up in IT publications all over the Internet, but what do they really mean? Edge computing is more straightforward, and has been simply defined as “data processing power at the edge of a network instead of in a cloud or a central data warehouse.” However, edge data centers are being defined in a variety of ways followed by outrageous claims that this new data center concept will “blow away the cloud.” Your preferred definition will likely depend on your industry. Here are 5 widely communicated ones to broaden your perspective.

Read More ›

Take Action for Net Neutrality

fight for net neutrality Read More ›

What Is a Permanent DoS (PDoS) Attack?

A Permanent Denial of Service attack, or a PDoS attack, is denial of service via hardware sabotage. One method of conducting a PDoS attack is commonly referred to as phlashing. During such an attack, an attacker bricks a device or destroys firmware, rendering the device or an entire system useless. In this scenario, the victim has no other choice than to repair the device or buy a new one to restore operations. PDoS attacks have been a known possibility for several years, but these tactics haven’t yet gained traction with hackers. Our partner Radware, a leading cybersecurity firm, predicts in their 2017 Global Application & Network Security Report that this type of attack will be on the rise this year.

Read More ›

Stopping Petya & Global Cyber Attacks: 6 Precautions to Take

bitcoin ransom

Only six weeks after WannaCry, a similar type of ransomware has hit organizations and spread globally. Petya has mostly affected companies in Ukraine, but has also struck organizations in 64 other countries, including major companies in the U.S., such as Merck & Co and Mars, Inc. Experts are still working to understand Petya and its mechanisms of action, and no kill switch has been discovered yet. However, there are a few basic precautions announced by our partner Radware that your company or organization should take at a minimum to stop the spread of ransomware and other viruses.

Read More ›

Data Foundry Joins Battle for the Net

net neutrality day of action 2017

As a long-time supporter of an open Internet, Data Foundry will join forces with many other technology companies on the local and national levels to stop the FCC from doing away with the current Open Internet Order. The official Battle for the Net day of protest is July 12. However, Data Foundry is taking many additional courses of action to see to it that major cable companies don’t limit our choices more than they are already limited. Yesterday we signed a letter to the FCC to show our support of smaller Internet Service Providers in their ongoing struggle with cable giants.

Read More ›

The First Tropical Storm of the Season Hits – Is Your Disaster Recovery Plan Ready?

The first tropical storm to hit the U.S. this season has arrived. Cindy made landfall this morning near the Texas/Louisiana border, bringing torrential rains and strong winds. Flooding is predicted to be most severe further north and east of where the storm made landfall, with flood warnings expected to continue in Louisiana, Mississippi and Alabama.

Read More ›
Page 4 of 18« First...23456...10...Last »