IAAS, CLOUD, AND MANAGED SERVICES BLOG
A few years ago, the enterprise was abuzz with concerns about the security implications of the use of mobile devices by employees. Many IT folks wanted to restrict the use of mobile devices over which they had little control. While the media embraced BYOD as the next big thing, those tasked with maintaining the security of corporate data were less enthusiastic.
Our recently restructured IaaS cloud server platform was the result of our fifteen year legacy of pioneering new managed application and web hosting services. During this time, we have constantly worked with clients to determine how to best meet their most demanding IT challenges. We have also remained keenly aware of how competitors have been approaching the market as it has evolved.
The Internet of Things will bring about an explosion in the number of connected devices and the data we have about the world. The one-off sale of useful objects — long the foundation of commerce — is likely to be replaced by the sale of services and personalized relationships with customers in a data and application ecosystem, bringing about a revolution in business models.
Many of the people reading these words are at work. They are looking at a screen connected to a computer that contains gigabytes of data and applications crucial to their productivity. Without the device, they are unable to work. Almost everyone else reading this article will have a smartphone in hand. Smartphones like the iPhone can carry gigabytes of data, but almost all of it will also live in the cloud and be accessible from any other device.
With the restructuring of our IaaS cloud server platform, we offer even better value for money with a tiered structure that empowers enterprise cloud clients to choose the best resource profile for their workloads. We've been hosting enterprise clients for a decade and half. Over the years we've developed a deep insight into the infrastructure hosting needs of business. To further empower our clients to deploy — and pay for — exactly the infrastructure they need, we've restructured our infrastructure-as-a-service offering.
The cloud now plays a greater role in the enterprise world than ever before - of that there can be no doubt. It’s become a core deployment model for IT departments all across enterprise, and a key factor in small business growth. That last one is what we’re interested in discussing today. Let’s jump right in.
This month, we're announcing a new addition to our suite of managed cloud applications: the Cartika Microsoft Exchange Cloud Platform. Microsoft Exchange needs no introduction: it's the world's leading enterprise collaboration and email solution, powering the communication of hundreds of thousands of businesses worldwide.
It’s something of a disconcerting statistic - fewer than one third of American financial organizations have a cloud strategy. Other regions don’t fare much better, either. EMEA shows 35% of firms preparing for cloud computing, while APAC is slightly higher, at 41%. Given the immense popularity of cloud computing in both enterprise and the consumer space, these statistics are troubling - even if they do show that more institutions are starting to realize the importance of going digital. What exactly is the root cause here? Why exactly are firms lagging behind to such a great degree? And more importantly, what can be done about it?
Some of our customers are facing and are impacted by the recent round of "Forex" site injections. The typical symptoms are site injections redirecting users to a "forex" landing page. Content can either be injected into existing pages, or, the injected bots can delete the content entirely and replace the content with code which accomplishes the same thing. The majority of the reported infections exploited a vulnerability in out-of-date Joomla and Wordpress core, plugins, modules and templates. Infections leverage publicly known vulnerabilities in WordPress, WHMCS, and Joomla enabled servers, and other customized dynamic PHP/ASP/SQL web applications. Database injections, via these exploits is also possible, and can act as a back door to re-inject websites after they have been cleaned once. I wanted to take a few minutes and discuss what Cartika is doing to help our customers, and what customers should be doing to deal with this situation if you have been impacted by it
Cartika is pleased to introduce New Relic analytics integration and roll out (phased roll out outlined below). We are very excited about this roll out and what it will mean for both our customers, and internally for our support staff to have access to this data. The benefits it will present to our customers is simply enormous. Developers, Sys Admins and DBA's will gain invaluable insights into the health of their environments, be able to more quickly identify problems, streamline their resource usage and make educated decisions about capacity and capacity planning. Internally, we are very excited to provide these sorts of tools and analytics to our support staff. Their ability to help customers identify issues, identify bad plugins or bad code and provide advise and consultations regarding upgrading strategies, code optimization and various other day to day issues is simply increased exponentially and dramatically. Their ability to identify such issues is expedited by presenting them the data in real time, in an easy to understand and clearly defined interface. We are enabling our support staff, with the tools they need, to quickly and efficiently provide the superior level of service and support we demand from our team.
The Domain Name Service is an essential part of the complex system that lets users connect to your website or application. It allows users to put a human readable URL — like cartika.com — into their browser and be connected to the server represented by that address. Essentially DNS translates URLs into IP addresses; it can be thought of as the Internet's address book. Without DNS, there would be no way for users to connect to your site unless they already knew its IP address. Learn More about Cartika AnyCast DNS
Last month, Anthem Incorporated - one of the world’s leading health insurance companies - made a very grim announcement to shareholders and clients. It was, a representative explained, the target of a “very sophisticated external cyberattack,” which allowed hackers to gain unauthorized access to its IT systems. The personal information of eighty million clients - data ranging from birthdays and names to medical IDs, social security numbers, street addresses, email addresses, and employment history - was compromised.
Lets say you have very popular website. It’s been chugging along fine for the last couple of months; your server has handled the load perfectly well. But as your site becomes ever more popular, the server starts to show the strain — too many connections swamp the available memory, pages load slowly, and sometimes not at all. It’s time for an upgrade.
When we think about artificial intelligence, what comes to mind is usually none-too-friendly fictional examples like HAL and the machines from The Matrix, although there are some more friendly AIs, like Data from Star Trek. Friendly or not, we’re a long way from having functional AIs of this type, but over the next few years, most of us are going to be relying on a narrow sort of AI: AIs capable of organizing a limited subset of data in useful ways.
If you've been in the IT industry for a while, you'll have an almost instinctive familiarity with what the cloud is, its various modalities, deployment models, and types. Intuitively, one would think that a deep understanding would make the cloud easy to explain to less technical people, but in fact the opposite is true. It's very difficult to put yourself in the mindset of someone who lacks the conceptual framework that those of us who have been around enterprise IT for a long time have developed.
There has always been a lot of confusion around the exact meanings of the various cloud service models and their intersection with deployment strategies. That's hardly surprising given that IaaS, PaaS, SaaS, public cloud, private cloud, hybrid cloud, and a dozen other as-a-service modalities are a complex combination of marketing speak and technical jargon. In this article, I'd like to tease out one confused strand: the relationship between Infrastructure-as-a-Service and public or private cloud deployments. I've chosen to address this topic because there's often considerable confusion around what a private cloud is: I've heard people say that a private cloud can't involve virtualization, that its just another name for traditional in-house deployments, that it's a form of colocation, that Google Apps is a private cloud, and so on — none of which are remotely accurate or at least not completely so.
Even the smallest of modern companies use networks that are both heterogeneous and dispersed. Business networks are composed of multiple services spread over many servers in diverse locations. I'm a writer, so you'd think I could make do without much of a network, but when I add up all the services I use to run my small business, I find that I rely on an extensive network of personal computers, mobile devices, backup servers, file servers, cloud storage servers, virtual private servers, SaaS applications, web hosting servers, and email services; hosted in the cloud, in my home, and on traditional hosting; and distributed all over Europe and the US.
There’s a dream of the cloud in which data flows freely around the globe, available anywhere, stored wherever is convenient, and detached from the normal concerns of information management. Technologically, companies don’t have to care about where their data is stored: it’s in the cloud and the cloud encourages users to be agnostic about which server, which data center, and even which country their data is housed in. But, legally and politically, the location of data matters a lot.
If there’s one thing that’s obvious to anyone who’s spent even a little bit of time online, it’s that security is one of the biggest hot-button issues on the modern web. As we store more and more information online, cyber-attacks are becoming increasingly lucrative - and the stakes involved in securing our data are rising ever higher. Not surprisingly, that means cyber-criminals are getting smarter and craftier. Whereas before a business might have to deal with the odd DDOS or man-in-the-middle attack, now there’s a constant risk that someone might jump in to exploit even the smallest security hole. It’s a culture of not-completely-unjustified paranoia - particularly since it seems as though many organizations aren’t pulling their weight as far as protecting their data is concerned.