7 Situations When Outsourcing IT Managed Services is Most Compelling

 January 26, 2017

Outsourcing IT and Managed ServicesKeeping up with the complexities and costs of information technology is no easy task and especially true for SMBs. To solve this challenge, many now leverage the cloud for their infrastructure needs. But, as valuable as the cloud can be, IT environments must still be deployed, optimized, monitored, managed, and secured. This is why outsourcing IT managed services in addition to infrastructure has become increasingly attractive. (more…)



Cloud-Based Backups are NOT a Total DR Solution

 December 06, 2016

Cloud-Based Backups CartikaCyber-attacks and natural disasters like hurricanes, floods, and fires always grab the headlines. But, what causes the high majority of business interruptions are ordinary, everyday events such as power failures, human error, and faulty software or hardware. As a result, most companies will experience a significant IT disruption at some point. Many are turning to cloud-based backups as a way of providing faster, and more reliable recovery. (more…)


Internet of Thing Will Give Birth to New Business Models

 December 10, 2015

Cartika Web HostingThe Internet of Things will bring about an explosion in the number of connected devices and the data we have about the world. The one-off sale of useful objects — long the foundation of commerce — is likely to be replaced by the sale of services and personalized relationships with customers in a data and application ecosystem, bringing about a revolution in business models. (more…)


Four Ways Cloud Virtual Desktops Enhance Your Company’s Productivity

 November 03, 2015

Cloud Virtual Desktops Enhance ProductivityMany of the people reading these words are at work. They are looking at a screen connected to a computer that contains gigabytes of data and applications crucial to their productivity. Without the device, they are unable to work.

Almost everyone else reading this article will have a smartphone in hand. Smartphones like the iPhone can carry gigabytes of data, but almost all of it will also live in the cloud and be accessible from any other device. (more…)


Does Infrastructure-as-a-Service Always Mean Public Cloud?

 November 26, 2014

Does IaaS Mean Public CloudThere has always been a lot of confusion around the exact meanings of the various cloud service models and their intersection with deployment strategies. That’s hardly surprising given that IaaS, PaaS, SaaS, public cloud, private cloud, hybrid cloud, and a dozen other as-a-service modalities are a complex combination of marketing speak and technical jargon.

In this article, I’d like to tease out one confused strand: the relationship between Infrastructure-as-a-Service and public or private cloud deployments. I’ve chosen to address this topic because there’s often considerable confusion around what a private cloud is: I’ve heard people say that a private cloud can’t involve virtualization, that its just another name for traditional in-house deployments, that it’s a form of colocation, that Google Apps is a private cloud, and so on — none of which are remotely accurate or at least not completely so. (more…)


Virtual Private Networks Help Keep Your Business’s Data Safe On The Open Internet

 November 18, 2014

Virtual Private NetworksEven the smallest of modern companies use networks that are both heterogeneous and dispersed. Business networks are composed of multiple services spread over many servers in diverse locations. I’m a writer, so you’d think I could make do without much of a network, but when I add up all the services I use to run my small business, I find that I rely on an extensive network of personal computers, mobile devices, backup servers, file servers, cloud storage servers, virtual private servers, SaaS applications, web hosting servers, and email services; hosted in the cloud, in my home, and on traditional hosting; and distributed all over Europe and the US. (more…)


The Importance Of Data Sovereignty For Cloud Users

 October 07, 2014

Importance Of Data SovereigntyThere’s a dream of the cloud in which data flows freely around the globe, available anywhere, stored wherever is convenient, and detached from the normal concerns of information management. Technologically, companies don’t have to care about where their data is stored: it’s in the cloud and the cloud encourages users to be agnostic about which server, which data center, and even which country their data is housed in. But, legally and politically, the location of data matters a lot. (more…)


What Role Does Security Play In Web Development?

 September 16, 2014

Web Development SecurityIf there’s one thing that’s obvious to anyone who’s spent even a little bit of time online, it’s that security is one of the biggest hot-button issues on the modern web. As we store more and more information online, cyber-attacks are becoming increasingly lucrative – and the stakes involved in securing our data are rising ever higher.

Not surprisingly, that means cyber-criminals are getting smarter and craftier. Whereas before a business might have to deal with the odd DDOS or man-in-the-middle attack, now there’s a constant risk that someone might jump in to exploit even the smallest security hole. It’s a culture of not-completely-unjustified paranoia – particularly since it seems as though many organizations aren’t pulling their weight as far as protecting their data is concerned. (more…)


iCloud Vulnerability Demonstrates Importance Of Rate Limiting For Cloud Security

 September 10, 2014

Rate Limiting For CloudThere’s probably no one with access to the Internet who isn’t aware that the security of Apple’s iCloud platform was called into question recently. I’m not going discuss the appalling theft of private data that ensued, but I do want to look at a related issue: rate limiting. While we’re not entirely sure of the cause of the leak of celebrity’s private photos—the likely strategy was simple social engineering, research of publicly available information, and the exploitation of poor password choices—we do know that around the same time a vulnerability was discovered in iCloud that made life much easier for any potential hackers. (more…)