4 Reasons IT Should Lead the Way to a Greener Planet

Written by Joe Kozlowicz on Wednesday, September 25th 2013 — Categories: Green Data Center

Let's move beyond greenwashing here. We'll be the first to admit that while many companies, including our own, may be extremely committed to energy efficiency, they also use it as a marketing tactic. There's a reason: it's a differentiator and a clear advantage to our services vs. the competition. This isn't us merely tooting our own horn or trying to play up our green practices. We're in it for the long haul. And I'm going to tell you why I think the technology industry as a whole should be leading the way to a greener future for everyone.

Continue Reading...


Wrangle Shadow IT and Empower BYOD with Hybrid Cloud

Written by Joe Kozlowicz on Wednesday, September 18th 2013 — Categories: Cloud Hosting, Hybrid Cloud, Cloud Hosting, Security, Virtual Desktop

You’ve likely heard of “shadow IT” or BYOD (bring your own device). Both terms refer to employees using private devices or software at the workplace—think iPads for work, or Google Drive to share files in a department. These practices may not be sanctioned by the IT department, but they improve productivity and save provisioning costs. However, they come with the risk of security breaches or other issues, causing IT headaches. By implementing an official BYOD policy and deploying hybrid cloud tools, companies can eliminate shadow IT and empower employees at the same time.

Continue Reading...


The Internet of Things

Written by Joe Kozlowicz on Thursday, September 12th 2013

The idea behind the Internet of Things is the complete automation of communication between all the things. In this situation a “thing” is essentially anything that can be assigned a piece of hardware and an IP address. The IP address allows the things to interact among themselves, thus removing the need for any human-to-human communication.

Kevin Ashton first coined the name for this technology filled future in 1999 but the foundation of the idea was started in the 1980’s when companies first began using technology to communicate with machines. Each year the advances in technology built on and confirmed the premise of the Internet of Things.

Continue Reading...


Dropbox Cloud Hacked: How Safe is SSL?

Written by Joe Kozlowicz on Tuesday, September 10th 2013 — Categories: Cloud Hosting, Cloud Storage, Security

At the end of August, news broke that two hackers had broken the two-factor security deployed by Dropbox, a cloud storage platform used by millions of people across the globe. The hackers published their methods in order to promote an open-source version of the program that could, they claimed, be safer for users overall. The hack puts cloud providers and users on edge: how safe is SSL?

Continue Reading...


The Four Layers of Data Center Security

Written by Joe Kozlowicz on Wednesday, September 4th 2013 — Categories: Colocation , Colocation, Data Center Design, Security

Although digital security is paramount to keeping your business data safe within our data center, and for meeting compliance standards, the physical security measures are just as important. For example, our HIPAA infographic shows how many data breaches result from stolen equipment. These threats are largely internal in nature, which is why four layers of security—physical facility security, that is—help ensure the safety of equipment and information stored in our facility.

Continue Reading...

Chat Now