Can you believe we’re already over a quarter of the way through 2016? Feels like we were just posting our 2015 blog wrap up yesterday. But here we are—the data center world keeps spinning. In case you missed something in the past three and a half months, we’ve collected our top blog posts and some of the most popular data center news headlines from around the blogosphere in today’s post.
IT spending is expected to stay flat or even constrict throughout 2016, according to Gartner.
How can CIOs, CTOs, or CFOs make their IT budgets go further while still delivering the applications and services their users have come to expect? Gartner, IDG, and others suggest the answer may lie in the cloud.
Citing an overlap between the clean, functional design of a well-organized and planned data center and the intentions of the Bauhaus and International movements, Green House Data CEO Shawn Mills announced the company would be retrofitting all data centers with mid-century modern modular design starting April 1, 2016.
Distributed Denial of Service attacks are nothing new, but they’re becoming more and more common, from politically motivated attacks on financial and government institutions to recent attacks on data centers like Digital Ocean. DDoS attacks are when hackers use hijacked computers to flood servers with incoming requests and essentially shut down services by clogging network traffic or sending mass quantities of junk data. They are increasingly difficult to defend against as they grow in scale, and because they are distributed among various infected machines, it can be difficult to block traffic based on IP address.
Public institutions, financial industries, eCommerce sites, and hosting providers are among the most popular targets, but anyone can be a victim—and if your IT infrastructure is hosted in a data center, you need that facility to provide strong DDoS mitigation to avoid service interruptions of your own.
Read on to learn common DDoS attack methods and mitigation strategies.
One of the most commonly cited obstacles to cloud adoption is security, which itself is an extension of the perceived loss of control over the infrastructure running your applications and storing your data. On the whole, cloud infrastructure is actually more secure than in-house data centers, as providers have dedicated staff, software, and hardware protections in place at a greater level than the majority of on-site facilities.
These protections take the form of many layers of physical security, best practices and documented plans for security responses, industry-leading firewalls, antivirus, antimalware, and monitoring software, and strict access control for users and administrators. But the malleability of the cloud, plus its many forms and applications, means that it is not always clear who should be in charge of securing a cloud deployment.
Do users or cloud providers need to be in charge of security? The answer depends on which part of the cloud stack you’re looking at.