The idea behind the Internet of Things is the complete automation of communication between all the things. In this situation a “thing” is essentially anything that can be assigned a piece of hardware and an IP address. The IP address allows the things to interact among themselves, thus removing the need for any human-to-human communication.
Kevin Ashton first coined the name for this technology filled future in 1999 but the foundation of the idea was started in the 1980’s when companies first began using technology to communicate with machines. Each year the advances in technology built on and confirmed the premise of the Internet of Things.
At the end of August, news broke that two hackers had broken the two-factor security deployed by Dropbox, a cloud storage platform used by millions of people across the globe. The hackers published their methods in order to promote an open-source version of the program that could, they claimed, be safer for users overall. The hack puts cloud providers and users on edge: how safe is SSL?
Although digital security is paramount to keeping your business data safe within our data center, and for meeting compliance standards, the physical security measures are just as important. For example, our HIPAA infographic shows how many data breaches result from stolen equipment. These threats are largely internal in nature, which is why four layers of security—physical facility security, that is—help ensure the safety of equipment and information stored in our facility.
It has been a very exciting week at Green House Data and we'd like to share some of our excitement with you! On Tuesday morning we hosted the groundbreaking ceremony for our new energy efficient data center in Cheyenne, WY. We have been working on this project for quite some time and are thrilled to officially be moving forward! Wyoming was kind enough to give us a gorgeous day for our ceremony and the turnout was great. During the ceremony we heard from a few people who have been integral in this project, such as Govenor Mead, Bob Jenson from the Wyoming Business Council, Randy Bruns from Cheyenne LEADS and Corey Welp with 1547 Critical Systems Realty.
By now, you’re probably using some form of cloud storage. People generally think about storing their current files in the cloud to access remotely or collaborate with others. Whether it’s Dropbox or Google Drive for personal use or logging into your company server for work, storing files remotely is becoming more commonplace everyday.
However, storing older files in the cloud is also wise. Many enterprises use a form of cloud backup, or Backup as a Service in some cases. Others may need to archive old data for compliance standards or other reasons. The cloud can help these companies remain flexible as they store data, adding resources as necessary; as well as meet compliance, easily manage data, and avoid in-house expenditure. Cloud backup and cloud archiving are very similar—after all, they both store files in the cloud to access later if something goes awry—but they have several key differences.