It has been a busy few years for the world’s computer hackers and there seems to be a new headline in the papers every week about the latest electronic security failures. One of the best way to deter hackers is […]
Happy Friday and to celebrate here is a little present for you. Pull up Google or Google Search and type in Zerg rush (or if you are too lazy, click Zerg Rush Me Now). If you are using a desktop […]
Data centers frequently house the most critical information for your business. If the data center is not protected adequately, then private and essential information about company operations, clients, employees and projects may become public knowledge — a breach that most […]
Webmasters running a cPanel dedicated server might have to update their servers next month as cPanel will end support for PHP 4. Beginning May 2012, EasyApache and cPanel will announce that they will no longer support PHP 4 for server […]
The biggest cities of the world struggle to keep it green, with governments frequently having to step in to introduce new policies and big companies using eco-friendly practices. Google’s dedication to the cause of environmentally friendly solutions at their data […]
April 22, 2012 marked the 32nd annual Earth Day. This year the Earth Day Network created “A Billion Acts of Green” and support their campaign, Colocation America wanted to show that the Data Center Industry is acting green, one server […]
***SSAE 16 is now SSAE 18 – This is just for history purposes.*** June 2011 brought the end of the SAS 70 report for data center reporting standards. Corporations that abide by the Sarbanes-Oxley regulations are now limited to a […]
Broadband connectivity represents one of the most significant factors for worldwide economic and cultural development. The need for consistent and high speed access to the Internet has already helped to reshape e-commerce and the data center industry while intensifying the […]
So in part one we introduced the subject of good IT Infrastructure, discussed key questions and defined the backup in detail. For part two we will be exploring deeper into the planning phase and encryption methods. How to Plan for […]