Data Foundry Blog

7 Reasons Why Fortune 5 Companies Utilize Colocation

servers in colocation data center

If building and operating enterprise data centers was always the best course of action, all the companies that had the cash flow to do so would do it. There are several reasons Fortune 5 companies continue to engage colocation providers rather than exclusively running their own data centers. These are seven reasons we hear repeatedly from large corporations that utilize colocation as part of their IT strategy.

Read More

Wrapping Up an Eventful 2016

Data Foundry 2016 photos

This holiday season we’re looking back on the eventful and exciting year that 2016 has been for Data Foundry, and as a company, we have a lot to be thankful for. We’ve seen healthy growth in the Austin and Houston markets, which has led to the kick off of the development of another data center for us in Austin, Texas 2, just one year after the completion of our Houston 2 data center. We’ve added several new managed services to our services portfolio, and we moved into a new corporate office just west of downtown Austin.

Read More

What’s the Best Backup Strategy?

how to choose a backup strategy

Backup solutions have evolved significantly since the days when full and differential backup were the only options. The best backup strategy for your company largely depends on the size of your organization and your RTO (Recovery Time Objective) and RPO (Recovery Point Objective).

Read More

Zero Rating Threatens the Open Internet

AT&T mergers with DirecTV, zero rating

At Data Foundry, we’re long-time advocates for open markets and the open Internet. Over the years we have worked on several efforts to protect the open Internet with rules such as those put forth in the FCC’s Open Internet Order.

Free or open market systems usually flourish with minimal regulation. However, this isn’t always the case, and it hasn’t been the case with Internet service providers. There is a lack of competition in the U.S. broadband market due to large companies dominating it by doing whatever it takes to eliminate competition and maintain their dominion. Recently, another major threat to the open Internet has been on our minds – AT&T’s historic mergers and the practice of zero-rating. So, what exactly is zero rating?

Read More

Data Foundry Speaks Up: Declares Need for Tech Committee in State Legislature

Texas legislature, state capitol

As a technology company whose founders, Ron and Carolyn Yokubaitis, were advocates before they were entrepreneurs, Data Foundry has always been involved in policy issues concerning technology and our fundamental rights.

Read More

What’s the Best Cloud Strategy?

hybrid cloud strategy

These days, companies cannot grow successfully without planning an IT infrastructure strategy. If that infrastructure fails, the company fails. It seems that most organizations are coming to the conclusion that a hybrid cloud model is the best option. According to the 451 Alliance, around 70% of organizations are currently using a multi-cloud model. RightScale’s 2016 State of the Cloud Report shows similar results with 71% of companies using a hybrid cloud model. Adoption of a hybrid cloud model increased by roughly 12% year over year.

Read More

The Cloud on Demand

shows how cloud services are like utilities

According to the 451 Alliance, SaaS (Software as a Service) is the most widely adopted type of cloud service, used by 70% of companies. This is followed by Iaas (Infrastructure as a Service) via the public cloud, which is currently utilized by 46% of companies. As the use of cloud storage and cloud applications continues to increase, there is a growing demand to connect directly to the cloud, that is, without traversing the public Internet.

Read More

5 Types of DDoS Attacks & How to Mitigate Them


A massive DDoS attack on DNS provider Dyn last Friday resulted in limited or no access for many users on major websites and platforms such as Twitter, Pardot, Spotify, New York Times, Netflix, SoundCloud and other popular websites. (Learn more about DNS in our ICANN article.) The attack was conducted using a self-replicating botnet called Mirai to infect devices connected to the Internet. Tens of millions of IP addresses were associated with the attack. This is not the first time a DNS network has fallen under attack – NSI experienced a massive, combination DDoS attack back in May that involved simple volumetric attacks to complex DNS lookup attacks.

  Read More

Shopping for Cyber Insurance? 10 Questions You Should Ask

cyber insurance risk

In a previous blog, we talked about assessing the need for cyber insurance. If your company has decided to seek coverage for cybercrime, these ten questions will help you through the rigorous process of finding the right policy based on your company’s needs and vulnerabilities.

Read More

Infographic: Determine if Cloud Storage is HIPAA-Compliant

HIPAA-compliant cloud storage snippet

Many of our customers have come to us with questions about HIPAA-compliant cloud storage. There’s a lot of marketing rhetoric online about HIPAA-certified Cloud Service Providers (CSPs) and other types of certified providers for that matter. First of all, there is no such thing as an official HIPAA certification. The Department of Health and Human Services (HHS), the organization that enforces HIPAA, does not provide HIPAA certifications, nor does it require them. This doesn’t mean that a CSP cannot be HIPAA-compliant, only that HHS does not guarantee their compliance. Also, no matter what type of certification a CSP claims to have, compliance is ultimately up to you, the “covered entity” or health services provider.

Read More
Page 9 of 20« First...7891011...20...Last »